General

  • Target

    CheckTest.exe

  • Size

    60KB

  • Sample

    241210-v8zcaa1paz

  • MD5

    a149091ddbbf8a023adf75cdc7678f73

  • SHA1

    260e9073577aeb16d041a77dd38bb90f03c7f856

  • SHA256

    0d37563cf9648338bf0e1f6f4a4463d4ffad04528fc0dc5f5939ea4d71199e30

  • SHA512

    56b198e9f90b26461b62cb8160b4e2e12b2c35a7a17967b5a7dc51d4d3d2c8d8028cf0dd7abb572fc77c0938e06d5e8454c81891c7adc84560d9d8e30ed4a3ef

  • SSDEEP

    1536:7jOuFsPymlKEgGbETDZDkb5eRfrwh5BOVC0S5p:7jmzKVH5kb5TVOVFS5p

Malware Config

Extracted

Family

xworm

Attributes
  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/vJmE27fr

Extracted

Family

xworm

Version

3.0

C2

plus-loves.gl.at.ply.gg:59327

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      CheckTest.exe

    • Size

      60KB

    • MD5

      a149091ddbbf8a023adf75cdc7678f73

    • SHA1

      260e9073577aeb16d041a77dd38bb90f03c7f856

    • SHA256

      0d37563cf9648338bf0e1f6f4a4463d4ffad04528fc0dc5f5939ea4d71199e30

    • SHA512

      56b198e9f90b26461b62cb8160b4e2e12b2c35a7a17967b5a7dc51d4d3d2c8d8028cf0dd7abb572fc77c0938e06d5e8454c81891c7adc84560d9d8e30ed4a3ef

    • SSDEEP

      1536:7jOuFsPymlKEgGbETDZDkb5eRfrwh5BOVC0S5p:7jmzKVH5kb5TVOVFS5p

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Xworm Payload

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks