General

  • Target

    CheckDevices3.exe

  • Size

    11KB

  • Sample

    241210-td291svkbl

  • MD5

    13c01e851815420a4ff0891208918dbf

  • SHA1

    df6d7550f4fe60853609f1facec9255af9721a88

  • SHA256

    9097140491dca61a92e42fea7cc9b04a6fcb5854d4c678381a5fc4f7426e3a17

  • SHA512

    0d401005fcd5f4d066c734eacd5a1f891a5b91b6a21f7e176667f0829797ab204f95aeecec9f37836f8712dda28c13720b0cf8ab3a1c3f8e8e5966f3622ce2d2

  • SSDEEP

    192:bqqTSm4ENSn3fbfo5iX2KVFfcTkbS8cvD+3Hp3lTVJneqqpO0:L34ENSn3fbfo53KPcIbS1vS3J3NVIqqQ

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/vJmE27fr

Extracted

Family

xworm

Version

3.0

C2

plus-loves.gl.at.ply.gg:59327

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      CheckDevices3.exe

    • Size

      11KB

    • MD5

      13c01e851815420a4ff0891208918dbf

    • SHA1

      df6d7550f4fe60853609f1facec9255af9721a88

    • SHA256

      9097140491dca61a92e42fea7cc9b04a6fcb5854d4c678381a5fc4f7426e3a17

    • SHA512

      0d401005fcd5f4d066c734eacd5a1f891a5b91b6a21f7e176667f0829797ab204f95aeecec9f37836f8712dda28c13720b0cf8ab3a1c3f8e8e5966f3622ce2d2

    • SSDEEP

      192:bqqTSm4ENSn3fbfo5iX2KVFfcTkbS8cvD+3Hp3lTVJneqqpO0:L34ENSn3fbfo53KPcIbS1vS3J3NVIqqQ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Xworm Payload

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks