General

  • Target

    SRTWARE LOADER.zip

  • Size

    1.1MB

  • Sample

    241204-kfsnxsvmcp

  • MD5

    a2a9db38e6610e97da9a2b7fb33ef2d2

  • SHA1

    058b60241ddaacaecb93488f1d20a957fe425d84

  • SHA256

    31255113e17d320985ad1641e08b17818ddc957996c0be157f850dccec9d6011

  • SHA512

    bf41b43853680fe26461f93ac9a9703ea833e5ba3063be737664a0051dd48631c45e4587a74e2c09c73668016c44cd335aa570d94c1c92c402907521392d3118

  • SSDEEP

    24576:GtKU1NdIjQYoMtlE9iYHEkVNeehZegXZIWdSFkQobbq+WdvM588dhOFqS:GMadI0xCG7JNnhUgXvWcbq+Wdk584Q

Malware Config

Targets

    • Target

      SRTWARE LOADER.zip

    • Size

      1.1MB

    • MD5

      a2a9db38e6610e97da9a2b7fb33ef2d2

    • SHA1

      058b60241ddaacaecb93488f1d20a957fe425d84

    • SHA256

      31255113e17d320985ad1641e08b17818ddc957996c0be157f850dccec9d6011

    • SHA512

      bf41b43853680fe26461f93ac9a9703ea833e5ba3063be737664a0051dd48631c45e4587a74e2c09c73668016c44cd335aa570d94c1c92c402907521392d3118

    • SSDEEP

      24576:GtKU1NdIjQYoMtlE9iYHEkVNeehZegXZIWdSFkQobbq+WdvM588dhOFqS:GMadI0xCG7JNnhUgXvWcbq+Wdk584Q

    Score
    1/10
    • Target

      srtware loader.exe

    • Size

      1.1MB

    • MD5

      f6f8a568173b6eb4615a4a1976e23ec0

    • SHA1

      4d1ce31764d041f6fdbb6b23dec84b9f36c038ee

    • SHA256

      18dfd072458b0742e9bf36776f86842461ebfa64ce69f48d16ac1e0c17f1d542

    • SHA512

      35fddd2f5ae9bec1326c3d6321479ce678b1cd28f0a78d1adfbeb595378ae72e7397d97a30d5f2ed170aba3f71445bc1fdaa3a039b5b0e1ad710fc4694fb7599

    • SSDEEP

      24576:kuxx2ZISuA29l1BFe6zMVg4VPQcNOtoKk1dABNRXu+gKwmf:kEx2ZuAS1B86g/VIWCVkK

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks