General

  • Target

    NitroGen.rar

  • Size

    50KB

  • Sample

    241125-e2fzcstrdj

  • MD5

    7423221a2acbf08a3d7db972291de395

  • SHA1

    67290519bbf80bc822a0c85c8a503cbdaa0922f1

  • SHA256

    afccdbb4d2be91d5b8de74fb8a0b4cb8b6f217808fcf6e1c8722fd2c8e01446c

  • SHA512

    17bc1894f504082f4d724fdb65de5157a104533f242ee3d383bddde3947b871997267f18616008f7c8414e4ce94a3d0c7db5af88273c98001a38e2944496648c

  • SSDEEP

    768:cRa2+VK9dZhqrGB1NuHI3zjBp4/KLvNJ5xo7pdXpO4IiyjCxYMqhjLrNr2RFOJdt:cRa9KPXq8co3zfLvzYpa4It9LrNr2RFs

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/mDSLGN9q

  • telegram

    https://api.telegram.org/bot7168105056:AAGVK3B7ZFupxq4PpmnBpxAQOwJ5CUp76ow/sendMessage?chat_id=1992635040

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7168105056:AAGVK3B7ZFupxq4PpmnBpxAQOwJ5CUp76ow/sendMessage?chat_id=1992635040

Targets

    • Target

      NitroGen.exe

    • Size

      244KB

    • MD5

      ba199a53400605e0dddec76f0bbb5d4f

    • SHA1

      81182bc28677dd07a8731d196244fb9643bde827

    • SHA256

      f273e967b289bf3c275aae486b8a49918a136c332fce84986417aac2f65d3a6a

    • SHA512

      578b6ac9bad24da3811239c8346e7d8fd33e2e3b1a322dddb829ce6336b5683421913f4dc8a12190d404ac8aa86129458b6ff3c24911a54986a485a61da815eb

    • SSDEEP

      1536:Grae78zjORCDGwfdCSog01313Rys5gCqbReEi0j+Rf21D2k:+ahKyd2n31F53/EAM2k

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks