Resubmissions
12-01-2025 11:07
250112-m7864azldz 10General
-
Target
G700 V6.6 Cracked By @R3D_Dev.rar
-
Size
300.7MB
-
Sample
250112-m7864azldz
-
MD5
b06d1f9c33eab6c0b7e43985a310a1b9
-
SHA1
9a65962360936f7b7c6151dedcc78c680ae55919
-
SHA256
33181679fc2b20b6d894364f5dc1b4f877afc4ed81e1bc85d41d525ba42bbdc1
-
SHA512
c469f257362996ebe9b6f8214d7b7f6406c5c4ef820f1b5cdaacb2b5834617a8737dad8a55f68bdf85845fb68b49274090962042e0375206b2280a33597ed414
-
SSDEEP
6291456:S6rtm/m0RKCllUJZNMeWnxCDu42FYD7pp5soI87St2qVmstPC:xtTkFllUTnWnxCDPPq2VM6
Behavioral task
behavioral1
Sample
G700 V6.6 Cracked By @R3D_Dev.rar
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
else-workflow.gl.at.ply.gg:58116
rm2klTpCTwZd9eL7
-
install_file
USB.exe
Targets
-
-
Target
G700 V6.6 Cracked By @R3D_Dev.rar
-
Size
300.7MB
-
MD5
b06d1f9c33eab6c0b7e43985a310a1b9
-
SHA1
9a65962360936f7b7c6151dedcc78c680ae55919
-
SHA256
33181679fc2b20b6d894364f5dc1b4f877afc4ed81e1bc85d41d525ba42bbdc1
-
SHA512
c469f257362996ebe9b6f8214d7b7f6406c5c4ef820f1b5cdaacb2b5834617a8737dad8a55f68bdf85845fb68b49274090962042e0375206b2280a33597ed414
-
SSDEEP
6291456:S6rtm/m0RKCllUJZNMeWnxCDu42FYD7pp5soI87St2qVmstPC:xtTkFllUTnWnxCDPPq2VM6
-
Detect Xworm Payload
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Xworm family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
3System Information Discovery
6System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1