General
-
Target
w.zip
-
Size
7.7MB
-
Sample
241128-xa2qvswmbw
-
MD5
9d50cd54890adf361bf032cc719d72cd
-
SHA1
7a82332c39a7aede83a9b92c98b4f6ff982b0fff
-
SHA256
ace47168d15ff37ea019a11bc0ad4f5353d277a9a9ebee6eeccb3101727cfb73
-
SHA512
19ebe2b83023b1c0b394ffaaffa5812c43c45ba870fe8293c6b393fe33df9abd0606c22b1ae3870431fa899e6e88f5a9969fb79f208c16ded020d5d81ae2fadc
-
SSDEEP
196608:PhyiwlApBaKR+w7tqsiNtGROHDqJhafp/VSFtMX30I8/rS:yApR+4tHiNtGRaG00FtJm
Behavioral task
behavioral1
Sample
w.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
w.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
154.216.19.12:7000
NuXVPKhDBKHTLExY
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7991608689:AAFUN71TMgyF_fzKFz6tyyBijaijI3s82tk
Extracted
gurcu
https://api.telegram.org/bot7991608689:AAFUN71TMgyF_fzKFz6tyyBijaijI3s82tk/sendMessage?chat_id=-4563001294
Targets
-
-
Target
w.zip
-
Size
7.7MB
-
MD5
9d50cd54890adf361bf032cc719d72cd
-
SHA1
7a82332c39a7aede83a9b92c98b4f6ff982b0fff
-
SHA256
ace47168d15ff37ea019a11bc0ad4f5353d277a9a9ebee6eeccb3101727cfb73
-
SHA512
19ebe2b83023b1c0b394ffaaffa5812c43c45ba870fe8293c6b393fe33df9abd0606c22b1ae3870431fa899e6e88f5a9969fb79f208c16ded020d5d81ae2fadc
-
SSDEEP
196608:PhyiwlApBaKR+w7tqsiNtGROHDqJhafp/VSFtMX30I8/rS:yApR+4tHiNtGRaG00FtJm
-
Detect Xworm Payload
-
Gurcu family
-
Xworm family
-
A potential corporate email address has been identified in the URL: FluxJacker@mrfluxdevNewCLientAF96946CAE31DEFA5DF4UserNameAdminOSFullNameMicrosoftWindows10ProUSBFalseCPUIntelCoreProcessorBroadwellGPUMicrosoftBasicDisplayAdapterRAMErrorGroupFJv1snew
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3