General
-
Target
DiscordNukerV1.0.exe
-
Size
14.8MB
-
Sample
241201-nq347azqfx
-
MD5
38df4465ac1c0b796df23a8c607a1d5b
-
SHA1
d1434d1f559deb702590a6c978b6e7d38e2a7767
-
SHA256
18b4e3d6eca1a5812222f2c4d1c86b68cb929fda16108242fef13a4f097f877f
-
SHA512
2af234bd6e438e30e8056e0b6fc4aedc651fcd6fa123b0688a02dd5af2d48aa5395e004d9ebc334743febab204dc3f10cb1c3f63f7102c9b9d9b7b7ef7f71bae
-
SSDEEP
196608:RQapTQTpurvvybvz5U0+tfSl5GNxc54hSOCFWYv3b6qDdc9pm7+4Sf9nCoUm4vvT:RQpuTybvCdpkGNXSOr+0ipc
Static task
static1
Behavioral task
behavioral1
Sample
DiscordNukerV1.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DiscordNukerV1.0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
193.161.193.99:57345
SomeVmTest-57345.portmap.host:57345
-
Install_directory
%ProgramData%
-
install_file
Microsoft Edge.exe
-
telegram
https://api.telegram.org/bot8173550372:AAFjEp_VO8z4680tyISQONWzSsBtso_p8-8/sendMessage?chat_id=7840504773
Targets
-
-
Target
DiscordNukerV1.0.exe
-
Size
14.8MB
-
MD5
38df4465ac1c0b796df23a8c607a1d5b
-
SHA1
d1434d1f559deb702590a6c978b6e7d38e2a7767
-
SHA256
18b4e3d6eca1a5812222f2c4d1c86b68cb929fda16108242fef13a4f097f877f
-
SHA512
2af234bd6e438e30e8056e0b6fc4aedc651fcd6fa123b0688a02dd5af2d48aa5395e004d9ebc334743febab204dc3f10cb1c3f63f7102c9b9d9b7b7ef7f71bae
-
SSDEEP
196608:RQapTQTpurvvybvz5U0+tfSl5GNxc54hSOCFWYv3b6qDdc9pm7+4Sf9nCoUm4vvT:RQpuTybvCdpkGNXSOr+0ipc
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1