General

  • Target

    edc3aaee08710efb4075a8ee0336bca09e2c02aa41be1cec7794dc60bccf1ec0N.exe

  • Size

    1.6MB

  • Sample

    250104-zndx3aymfn

  • MD5

    fd916b5a03cbd36946d3e984facd2830

  • SHA1

    facdc37ecfc4ec4e7728e441fecd9c5463e634f6

  • SHA256

    edc3aaee08710efb4075a8ee0336bca09e2c02aa41be1cec7794dc60bccf1ec0

  • SHA512

    b4070781ce4257b576d311e86372516530606bab259a4ec31c81b2055be0ba5400e6b90fc29be964033bfad56bd1acd7d9c497096080458c2d53380850bac59c

  • SSDEEP

    24576:wqXpbSKduSouaZ1EodUD36JyYh4OzQDzxMmmw5OjCI4WjlAIdHT:wq52BuO1n+j6Jfj0Hy73jCzWiIFT

Malware Config

Extracted

Family

xworm

C2

81.236.193.88:7000

f8terat.ddns.net:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    chrome.exe

  • telegram

    https://api.telegram.org/bot6494530798:AAEbPuClZKHOLS6zHwCLBQgZW7x00IaQ8x0/sendMessage?chat_id=5456205643

Extracted

Family

remcos

Botnet

OneDrive

C2

f8terat.ddns.net:2404

81.236.193.88:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    5

  • connect_interval

    1

  • copy_file

    OneDrive.exe

  • copy_folder

    OneDrive

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    OneDrive

  • mouse_option

    false

  • mutex

    W1nD-FVM6LX

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    OneDrive

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7680770119:AAEYBnZhEMPfJsgkH4qnTczGnmQ95OxUGhU/sendDocument

Targets

    • Target

      edc3aaee08710efb4075a8ee0336bca09e2c02aa41be1cec7794dc60bccf1ec0N.exe

    • Size

      1.6MB

    • MD5

      fd916b5a03cbd36946d3e984facd2830

    • SHA1

      facdc37ecfc4ec4e7728e441fecd9c5463e634f6

    • SHA256

      edc3aaee08710efb4075a8ee0336bca09e2c02aa41be1cec7794dc60bccf1ec0

    • SHA512

      b4070781ce4257b576d311e86372516530606bab259a4ec31c81b2055be0ba5400e6b90fc29be964033bfad56bd1acd7d9c497096080458c2d53380850bac59c

    • SSDEEP

      24576:wqXpbSKduSouaZ1EodUD36JyYh4OzQDzxMmmw5OjCI4WjlAIdHT:wq52BuO1n+j6Jfj0Hy73jCzWiIFT

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Xworm Payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Adds policy Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks