General

  • Target

    wirus.bat

  • Size

    1KB

  • Sample

    241201-w54m9ssqcq

  • MD5

    76e4df9bc8e43f9304b288a6d92c306e

  • SHA1

    e1526b2681a67249c515c34e4af223772d8d04ee

  • SHA256

    a17ec4037b686aea40b88b83db4cc0feaa12fbdea3d4905e792ecac8206ebdc8

  • SHA512

    b876e689c6bdb26e53f834c7dfcea8f7c9d64a4d90f8404dcdf5f4b51c8e4fa8a247109c4e427c5e78c4a7c80f116367162b0ee4d8ab8e16cf4204bf349727b9

Malware Config

Extracted

Family

xworm

C2

like-minute.gl.at.ply.gg:57419

0x95A205325e1d7e8Ae05449a767Ec43ca8F695c2c:2

Attributes
  • Install_directory

    %AppData%

  • install_file

    thc z konopi i chuj cie to.exe

  • telegram

    https://api.telegram.org/bot7942076611:AAFEIT9LkmplB4M4OyZ2MgCkxpttEJzMKg0/sendMessage?chat_id=7183216895

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7942076611:AAFEIT9LkmplB4M4OyZ2MgCkxpttEJzMKg0/sendMessage?chat_id=7183216895

Targets

    • Target

      wirus.bat

    • Size

      1KB

    • MD5

      76e4df9bc8e43f9304b288a6d92c306e

    • SHA1

      e1526b2681a67249c515c34e4af223772d8d04ee

    • SHA256

      a17ec4037b686aea40b88b83db4cc0feaa12fbdea3d4905e792ecac8206ebdc8

    • SHA512

      b876e689c6bdb26e53f834c7dfcea8f7c9d64a4d90f8404dcdf5f4b51c8e4fa8a247109c4e427c5e78c4a7c80f116367162b0ee4d8ab8e16cf4204bf349727b9

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Contacts a large (546) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • A potential corporate email address has been identified in the URL: =@L

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

MITRE ATT&CK Enterprise v15

Tasks