General

  • Target

    Specter Screen Grabber.exe

  • Size

    11.0MB

  • Sample

    241201-31amysyldy

  • MD5

    7918234c2953a1ef45480b1224371750

  • SHA1

    ae40e7be6833b2d2cc54eb5f325771def35cb370

  • SHA256

    2daa61ed02cf604312b1d91ba8c161bb31fdff082f849eb4e5c4000d90a40388

  • SHA512

    ed41b069e9fe99159141a294393e8823be8f56e5ea1e89ce0f113e8d7646b9aef4d9aa80941669ff2da95a4c7c1fb378f9a9f5ea58db519e09f7f37ba9615587

  • SSDEEP

    196608:GKWyhmducMnCUkFuRLuId3wpguRMV/DBU9AAwy2efaTqTpXoKIlQqe0Uz/Sr/lHW:GCEQcULPWguRM9FQwFWTpXoK+wSr/lCl

Malware Config

Extracted

Family

xworm

C2

24.ip.gl.ply.gg:2962

Attributes
  • install_file

    USB.exe

Targets

    • Target

      Specter Screen Grabber.exe

    • Size

      11.0MB

    • MD5

      7918234c2953a1ef45480b1224371750

    • SHA1

      ae40e7be6833b2d2cc54eb5f325771def35cb370

    • SHA256

      2daa61ed02cf604312b1d91ba8c161bb31fdff082f849eb4e5c4000d90a40388

    • SHA512

      ed41b069e9fe99159141a294393e8823be8f56e5ea1e89ce0f113e8d7646b9aef4d9aa80941669ff2da95a4c7c1fb378f9a9f5ea58db519e09f7f37ba9615587

    • SSDEEP

      196608:GKWyhmducMnCUkFuRLuId3wpguRMV/DBU9AAwy2efaTqTpXoKIlQqe0Uz/Sr/lHW:GCEQcULPWguRM9FQwFWTpXoK+wSr/lCl

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks