General

  • Target

    SWA V1.5.rar

  • Size

    31.8MB

  • Sample

    241128-xj2r8awpcz

  • MD5

    71208a810a5cdbf1efbd160ba43e8555

  • SHA1

    5f7a2b275e0ca9d3474683e605b3cf5c5251a8b4

  • SHA256

    424cb0798a709bd9ff7a96f067d51f69db5bbb0f1d73d738e10968a75f7102e8

  • SHA512

    6aed4ebfc74efe395b78fd7499ffbb1e8f3ce15b6c414dbe50c3f5e8a2bffb2c721be64f4ff36511e33612c57963a8fa375d7570b9164dfcc37fa1782fea9913

  • SSDEEP

    786432:ydJYqGw5xfjVisUIqfGSzBPmJcVxNmgYDlEZIKEe0l:ydmqxzrGNlPkcnNJImZMe0l

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:52872

23.ip.gl.ply.gg:52872

127.0.0.1:61713

street-navy.gl.at.ply.gg:61713

key-spare.gl.at.ply.gg:64178

127.0.0.1:60766

23.ip.gl.ply.gg:60766

127.0.0.1:60342

important-standing.gl.at.ply.gg:60342

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Extracted

Family

xworm

Version

5.0

C2

kingdom-nato.gl.at.ply.gg:1260

Mutex

cobHi7aqLVJbbtyr

Attributes
  • Install_directory

    %AppData%

  • install_file

    svhost.exe

aes.plain

Targets

    • Target

      SWA V1.5.rar

    • Size

      31.8MB

    • MD5

      71208a810a5cdbf1efbd160ba43e8555

    • SHA1

      5f7a2b275e0ca9d3474683e605b3cf5c5251a8b4

    • SHA256

      424cb0798a709bd9ff7a96f067d51f69db5bbb0f1d73d738e10968a75f7102e8

    • SHA512

      6aed4ebfc74efe395b78fd7499ffbb1e8f3ce15b6c414dbe50c3f5e8a2bffb2c721be64f4ff36511e33612c57963a8fa375d7570b9164dfcc37fa1782fea9913

    • SSDEEP

      786432:ydJYqGw5xfjVisUIqfGSzBPmJcVxNmgYDlEZIKEe0l:ydmqxzrGNlPkcnNJImZMe0l

    • Detect Xworm Payload

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Xmrig family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks