General
-
Target
https://cas5-0-urlprotect.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fdrive.google.com%2ffile%2fd%2f1y4twidPt%5fxIGHtWPIS0Y3kuf2C%5faOEMg%2fview%3fusp%3dsharing&umid=44756b35-30d3-448b-a7b0-49fbc9be1930&auth=215f1a6ecbf033888ef4204498c1bcb4ca577ef8-9bec1ee02d92b6e86ba5b11a0b536b0d16e6759e
-
Sample
241120-re4hcsybqp
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cas5-0-urlprotect.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fdrive.google.com%2ffile%2fd%2f1y4twidPt%5fxIGHtWPIS0Y3kuf2C%5faOEMg%2fview%3fusp%3dsharing&umid=44756b35-30d3-448b-a7b0-49fbc9be1930&auth=215f1a6ecbf033888ef4204498c1bcb4ca577ef8-9bec1ee02d92b6e86ba5b11a0b536b0d16e6759e
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=
Extracted
https://drive.google.com/uc?export=download&id=
Extracted
Protocol: ftp- Host:
ftp.desckvbrat.com.br - Port:
21 - Username:
desckvbrat1 - Password:
mfnEdMDLnE@@1578
Extracted
Protocol: ftp- Host:
ftp.desckvbrat.com.br - Port:
21 - Username:
desckvbrat1 - Password:
fYudY1578@@@@@@
Extracted
xworm
5.0
moneyluckwork.ddns.net:7000
moneyluck.duckdns.org:7000
HLfH6HTja99GuzBA
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6063212727:AAGxI15ihXd3ydfdlrCIMNDRzM08Ew5M1gY/sendMessage?chat_id=1188038887
Targets
-
-
Target
https://cas5-0-urlprotect.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fdrive.google.com%2ffile%2fd%2f1y4twidPt%5fxIGHtWPIS0Y3kuf2C%5faOEMg%2fview%3fusp%3dsharing&umid=44756b35-30d3-448b-a7b0-49fbc9be1930&auth=215f1a6ecbf033888ef4204498c1bcb4ca577ef8-9bec1ee02d92b6e86ba5b11a0b536b0d16e6759e
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Window
1Indicator Removal
1File Deletion
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1