General
-
Target
Payment-Order24560274for8380USD.7z
-
Size
389KB
-
Sample
241230-msna3svlbn
-
MD5
5c590bcb3f1e94df05e6d58b3a696294
-
SHA1
73d075150175cda0a98e8c239b5351c4a6b435a4
-
SHA256
0e43ddda43c57d175c94fb57d1e8501d27d8c54c02c5ebba43f01516eadeec3c
-
SHA512
9c4fcaa9273a6d945c9eb42aa8717b8b54affd79bc87676ad93606891eadda5be3bd273331dc9892cea7329fe28fbb58dec5ddff74cf54419545130e1f3a727f
-
SSDEEP
6144:Xg/FOM4EpFdD7DQbvtOjhgFPy27CM8dvCs6HXHxion1Oiq4BHkqobsLN1:Xg/iYneuWF6SCM8gs6HXHxNOiq4loQf
Static task
static1
Behavioral task
behavioral1
Sample
Payment-Order #24560274 for 8,380 USD.exe
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
0.5.8
Default
91.223.3.156:7707
91.223.3.156:8808
TcNC0kSWrpnZ
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
3.1
212.23.222.198:7000
Ihzd02cPcnJ09l8B
-
install_file
USB.exe
Targets
-
-
Target
Payment-Order #24560274 for 8,380 USD.exe
-
Size
392KB
-
MD5
eac2017286abefbd21b28e7f9fcab248
-
SHA1
02f90ba750bf3801e286ecfbf3467110f8b2ef94
-
SHA256
e8f6dc455cea42a08feb8fcf5a34928864d537ec5ec905576cee58c9fabd6a5f
-
SHA512
fa0a14b1bfce0fac1bbb1488f319dd864b9a94e784a6a637907d3bd31dddb80043de71ee582def13e72b9a4c2490c1738fa8d676feb3bc519d26bc75936db48b
-
SSDEEP
12288:OaoO2yd67Jss86xlfLfC7hgooOK6YQMhUZC9WpVyi:OnV8gooOeQtrl
-
Asyncrat family
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1