General

  • Target

    xWormRat.exe

  • Size

    6.0MB

  • Sample

    241126-y82desyjfy

  • MD5

    88b0a00ccd2d09da53d7299e6abac771

  • SHA1

    4694a9f9e640f168ea4a1561643ad887ef5e0451

  • SHA256

    f8329f69cb6ce2449bd631e36f901644d6eef124a14853b1e181c47c10d27efd

  • SHA512

    34051f119c197ab142c613525a07f9e4914f3960416d9433644e70f3355a47639d6f24adf1ce11bc2709fb41ee081290510341121c8f916883f39df10d11b64f

  • SSDEEP

    196608:lR9FIm/meN/FJMIDJf0gsAGK4RenAK6Z0/:3s4/Fqyf0gstmAKZ

Malware Config

Targets

    • Target

      xWormRat.exe

    • Size

      6.0MB

    • MD5

      88b0a00ccd2d09da53d7299e6abac771

    • SHA1

      4694a9f9e640f168ea4a1561643ad887ef5e0451

    • SHA256

      f8329f69cb6ce2449bd631e36f901644d6eef124a14853b1e181c47c10d27efd

    • SHA512

      34051f119c197ab142c613525a07f9e4914f3960416d9433644e70f3355a47639d6f24adf1ce11bc2709fb41ee081290510341121c8f916883f39df10d11b64f

    • SSDEEP

      196608:lR9FIm/meN/FJMIDJf0gsAGK4RenAK6Z0/:3s4/Fqyf0gstmAKZ

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks