Resubmissions

02-01-2025 06:41

250102-hf8c9syldy 10

02-01-2025 06:38

250102-hea2da1lcn 7

General

  • Target

    https://download2296.mediafire.com/3wqkmffmyiqgwgZeo9kF_YCYN9O1KnUin_fFW8qUsghlZgslM0x0VWypuDJDfyfngH15isceG9cyo1xB2Gll6clAsXYWD1MrtxUQbSJZ9SkVoL46s-YSIS33zr3_TU_qJ1PEWRfeoRP5eaQPKKDOjzBNqzzMVKWsV_kAQTrmKSvsGLZtQA/dnvbxlii6k3p4ey/Wave-Setup.rar

  • Sample

    250102-hf8c9syldy

Malware Config

Extracted

Family

xworm

C2

myskibiditoilet.zapto.org:42662

Attributes
  • Install_directory

    %AppData%

  • install_file

    RuntimeBroker.exe

  • telegram

    https://api.telegram.org/bot8006038208:AAGxaRzh6MiD_RioJtUt9iA5WVfeKxZwiu4/sendMessage?chat_id=6338341120

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8006038208:AAGxaRzh6MiD_RioJtUt9iA5WVfeKxZwiu4/sendMessage?chat_id=6338341120

Extracted

Family

latentbot

C2

myskibiditoilet.zapto.org

Targets

    • Target

      https://download2296.mediafire.com/3wqkmffmyiqgwgZeo9kF_YCYN9O1KnUin_fFW8qUsghlZgslM0x0VWypuDJDfyfngH15isceG9cyo1xB2Gll6clAsXYWD1MrtxUQbSJZ9SkVoL46s-YSIS33zr3_TU_qJ1PEWRfeoRP5eaQPKKDOjzBNqzzMVKWsV_kAQTrmKSvsGLZtQA/dnvbxlii6k3p4ey/Wave-Setup.rar

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks