General
-
Target
Obekrftade288516.crdownload
-
Size
8.5MB
-
Sample
241203-mh7lzawrem
-
MD5
e24553fa7e15ffdee78de1a9556c650b
-
SHA1
6f99b032f86cdb5ec6fe808edf2a219a0bc0f8ed
-
SHA256
c0c791bebc9acf7f1b1202a32a621adead08aff49252dfab9363b268d680b235
-
SHA512
422ebe03372d0ac0d82119025f5b348100d528688300e974be74bb7d60817b0c7a28387375e2f91b4c5ba18129cda950b5de64efe24e0ad4c7caf22d83ad205e
-
SSDEEP
196608:0vtyXaw/YhZII9yMGkXmyQscGZ0UDh9eAxcqctMy4yy:0FyqEqII9yMGkXUscGFDh9eAxYly
Behavioral task
behavioral1
Sample
danger-multi-tool-main/src/main.py
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
danger-multi-tool-main/src/main.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
danger-multi-tool-main/src/utils/__pycache__/cpython-311.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
danger-multi-tool-main/src/utils/__pycache__/cpython-311.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
danger-multi-tool-main/start.bat
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
danger-multi-tool-main/start.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
45.83.246.140:30120
-
Install_directory
%AppData%
-
install_file
runtime.exe
Targets
-
-
Target
danger-multi-tool-main/src/main.py
-
Size
13KB
-
MD5
c48f27c10efb969ac31147a787860fb9
-
SHA1
611c119923825407e300cc86ec258669b0224ebd
-
SHA256
984c5a8704a16386a31fb31f903da7c24a7b67c224906be88039ea15ead84286
-
SHA512
fd23d04786f93d5e2440912b71d83df15b100e2bd286e68e32cfb7ce23eb9f346c531fe822fc953c1eccbaf6395b63acc7697851ebc608834e5852a15056141c
-
SSDEEP
384:MG87mbbEB8IXCa7bujRs8pWS+QinACIBadXGxuapdBeYyil4TKl17+Ryf3urqpMG:MG+mba8IXCa7bujRs8pWS+QinACIBad+
Score3/10 -
-
-
Target
danger-multi-tool-main/src/utils/__pycache__/cpython-311.pyc
-
Size
7.4MB
-
MD5
1a2ff293768d10b8c99d3cd2950164b9
-
SHA1
e9123a3d2a53b5f8d008db9608037dd0571f3cae
-
SHA256
3c09a37412bf3981e5d678b6598c2cdad32fcd6761fc649a50693ba45746e242
-
SHA512
ff8a853675431bc36d88288546d7f467f239ae2e4e7ef019476ac4ca06f715e88f201753d7201dbfacb3b6dca51be764036372de8a8c0def29e00ae5e9469941
-
SSDEEP
98304:FWeYgI6OshoKyDvuIYc5AhV+gEc4kZvRLoI0EJfNA3z5UTfHfyk6LK4dSI23o7yc:FPYmOshoKMuIkhVastRL5Di3tO/ys42O
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
danger-multi-tool-main/start.bat
-
Size
30KB
-
MD5
7ba955995f65ce6b05a74ee4515749cb
-
SHA1
2710d30d8077a3c72cd819fbe7cc8b52188b57db
-
SHA256
eaf6f1b53d2b7e04b7a1250ccae7fa440fef762b243b58de3fad89d797143cc7
-
SHA512
6d4b7be5872b6762e922c925e9566d3751ad0bf5f745f00462c6c6c5e98bacc14e2bd16ef379bcf4d75167aeb088571efe957279d3b330e864ef439e743da2ac
-
SSDEEP
48:9gros7BK7cp3zI8FpIJp/4eai2gF9H2YHwvfol2+:9gO4dI8ihXf
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1