General

  • Target

    SolaraV3.exe

  • Size

    3.9MB

  • Sample

    241128-wzbejawjdx

  • MD5

    049b4bc7787ad8a51742c70aeeebcd1e

  • SHA1

    f9dde99a75d0f743a3e57c75d4f5033e6798f428

  • SHA256

    28fd006eb1262eef180fbca69cf0c4bb10f56f452345f61a3e9e5addf0bcaf40

  • SHA512

    46dc5961337dd8b70f97b2fdd0569e75f51692540e004ad7f1850746d4d57d34d664108a9fdee50658f3a32a6aed538dbec7744de2c1ef79aea09e93ba2d5883

  • SSDEEP

    98304:RosZaqtF6shb3FPZVYNMH9Hoh9/g7diYEDZsGIQsj6JPkCeMQMaKfTLkzkS:esZaGdb3FPZbJqAdibDZsGIQsj6JsCeP

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    explorer.exe

  • telegram

    https://api.telegram.org/bot8013268995:AAHt5-BJsAIEM9hnoTy17y1WYC4NnCMU398/sendMessage?chat_id=5405936031

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8013268995:AAHt5-BJsAIEM9hnoTy17y1WYC4NnCMU398/sendMessage?chat_id=5405936031

Targets

    • Target

      SolaraV3.exe

    • Size

      3.9MB

    • MD5

      049b4bc7787ad8a51742c70aeeebcd1e

    • SHA1

      f9dde99a75d0f743a3e57c75d4f5033e6798f428

    • SHA256

      28fd006eb1262eef180fbca69cf0c4bb10f56f452345f61a3e9e5addf0bcaf40

    • SHA512

      46dc5961337dd8b70f97b2fdd0569e75f51692540e004ad7f1850746d4d57d34d664108a9fdee50658f3a32a6aed538dbec7744de2c1ef79aea09e93ba2d5883

    • SSDEEP

      98304:RosZaqtF6shb3FPZVYNMH9Hoh9/g7diYEDZsGIQsj6JPkCeMQMaKfTLkzkS:esZaGdb3FPZbJqAdibDZsGIQsj6JsCeP

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Modifies Windows Defender Real-time Protection settings

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UAC bypass

    • Xmrig family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Creates new service(s)

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks