General
-
Target
EzFN-Manager.exe
-
Size
11.3MB
-
Sample
241128-xt5xmaxjdx
-
MD5
72129e47177ee1b7e454eecf9bff4dff
-
SHA1
67089411d7483d5e12c07610602d1c1299528c5a
-
SHA256
a45af606076ebaaff640b37f37dd7c012d397ae5ebacc2d721a9a78cc8d9e672
-
SHA512
cef9d9a35d9a444f2723a5fd367c546241fea85a5a130890136e5ddcb849af41b031498c108ea8d107f1a91ae66693fd1e6fe543f2bd3196770bfdcbec65eb5b
-
SSDEEP
196608:ywrwlypu8PZ3PpxRY5aJcEf86CK8Md/f5vjO0xbCEZ7LL80MaJsR+h:ywGuua3YaKC8XWX5qQuE7v8CJG
Static task
static1
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1311730654383308871/KQQ25doAFWBI4NnsNaKchjBjJDpIiowg2SpkEtAoRCExPatjlopyWE8UP0ZjYw0ADS6x
Extracted
xworm
5.0
John235-52825.portmap.host:52825
TTMtKmQoNFIN9kYg
-
Install_directory
%ProgramData%
-
install_file
WinRar.exe
Targets
-
-
Target
EzFN-Manager.exe
-
Size
11.3MB
-
MD5
72129e47177ee1b7e454eecf9bff4dff
-
SHA1
67089411d7483d5e12c07610602d1c1299528c5a
-
SHA256
a45af606076ebaaff640b37f37dd7c012d397ae5ebacc2d721a9a78cc8d9e672
-
SHA512
cef9d9a35d9a444f2723a5fd367c546241fea85a5a130890136e5ddcb849af41b031498c108ea8d107f1a91ae66693fd1e6fe543f2bd3196770bfdcbec65eb5b
-
SSDEEP
196608:ywrwlypu8PZ3PpxRY5aJcEf86CK8Md/f5vjO0xbCEZ7LL80MaJsR+h:ywGuua3YaKC8XWX5qQuE7v8CJG
-
Detect Xworm Payload
-
Skuld family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1