Resubmissions

17-11-2024 12:44

241117-pyzmeazjez 10

General

  • Target

    srtware loader.exe

  • Size

    1.1MB

  • Sample

    241117-pyzmeazjez

  • MD5

    de920407355f76c7ef087fafb1f8ae8c

  • SHA1

    73ec5917b60133981764f57939c576a5ea94c2d5

  • SHA256

    eedee87650ce6252c755af15d7065ca4292fc56dd5e848335dc8265ded837fc1

  • SHA512

    4278b11aab909a92157f0a3221ae775c12088e6464f7a8f63ac58c3d4df29327565a97147d3a0d9a9647f83783dba6db7935c22a70c393e4e603e2dda44d9112

  • SSDEEP

    24576:WLzpI+xRUz1EGES2zRP9RPVwzCBjzZg/amV8q2MBTZr5VlenU:6dxKNePXVKVLn1Vj

Malware Config

Targets

    • Target

      srtware loader.exe

    • Size

      1.1MB

    • MD5

      de920407355f76c7ef087fafb1f8ae8c

    • SHA1

      73ec5917b60133981764f57939c576a5ea94c2d5

    • SHA256

      eedee87650ce6252c755af15d7065ca4292fc56dd5e848335dc8265ded837fc1

    • SHA512

      4278b11aab909a92157f0a3221ae775c12088e6464f7a8f63ac58c3d4df29327565a97147d3a0d9a9647f83783dba6db7935c22a70c393e4e603e2dda44d9112

    • SSDEEP

      24576:WLzpI+xRUz1EGES2zRP9RPVwzCBjzZg/amV8q2MBTZr5VlenU:6dxKNePXVKVLn1Vj

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks