General
-
Target
Payment-Order #24560274 for 8,380 USD_1.7z
-
Size
389KB
-
Sample
241230-mgjthsxmdt
-
MD5
5c590bcb3f1e94df05e6d58b3a696294
-
SHA1
73d075150175cda0a98e8c239b5351c4a6b435a4
-
SHA256
0e43ddda43c57d175c94fb57d1e8501d27d8c54c02c5ebba43f01516eadeec3c
-
SHA512
9c4fcaa9273a6d945c9eb42aa8717b8b54affd79bc87676ad93606891eadda5be3bd273331dc9892cea7329fe28fbb58dec5ddff74cf54419545130e1f3a727f
-
SSDEEP
6144:Xg/FOM4EpFdD7DQbvtOjhgFPy27CM8dvCs6HXHxion1Oiq4BHkqobsLN1:Xg/iYneuWF6SCM8gs6HXHxNOiq4loQf
Static task
static1
Behavioral task
behavioral1
Sample
Payment-Order #24560274 for 8,380 USD.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.8
Default
91.223.3.156:7707
91.223.3.156:8808
TcNC0kSWrpnZ
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
3.1
212.23.222.198:7000
Ihzd02cPcnJ09l8B
-
install_file
USB.exe
Targets
-
-
Target
Payment-Order #24560274 for 8,380 USD.exe
-
Size
392KB
-
MD5
eac2017286abefbd21b28e7f9fcab248
-
SHA1
02f90ba750bf3801e286ecfbf3467110f8b2ef94
-
SHA256
e8f6dc455cea42a08feb8fcf5a34928864d537ec5ec905576cee58c9fabd6a5f
-
SHA512
fa0a14b1bfce0fac1bbb1488f319dd864b9a94e784a6a637907d3bd31dddb80043de71ee582def13e72b9a4c2490c1738fa8d676feb3bc519d26bc75936db48b
-
SSDEEP
12288:OaoO2yd67Jss86xlfLfC7hgooOK6YQMhUZC9WpVyi:OnV8gooOeQtrl
-
Asyncrat family
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4