Resubmissions

16-01-2025 20:24

250116-y67sesxmgw 10

16-01-2025 20:21

250116-y4yfzaxqhj 4

16-01-2025 20:03

250116-yss24sxlel 10

16-01-2025 19:53

250116-yl22fawma1 10

16-01-2025 19:45

250116-ygh3rswkdz 10

General

  • Target

    fatality_loader.rar

  • Size

    956KB

  • Sample

    250116-yl22fawma1

  • MD5

    5c917c1945a53e6c6fd9e55c52a5071f

  • SHA1

    33829463306b1ea8d8997c136c7ad87467773cef

  • SHA256

    fda69ccb7e8acf085194e1359b1facf3b7c8f5b8eca43172a2a199d22aa675a9

  • SHA512

    69d4e041c83e2298c1c8f56a48dee9be249ae4ffbd84b75a94203015cfde21998b8f798798de55dd9ab1813550c2442d89a84e1586a65c8c96d8f64513353e43

  • SSDEEP

    24576:Rej8HegWnDJNfJJB8XWQ/zx7raihPUOOORYgZ:S8HfWDJNGXZ/Nra4rpOgZ

Malware Config

Extracted

Family

xworm

C2

star-telecharger.gl.at.ply.gg:27119

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      fatality_loader.rar

    • Size

      956KB

    • MD5

      5c917c1945a53e6c6fd9e55c52a5071f

    • SHA1

      33829463306b1ea8d8997c136c7ad87467773cef

    • SHA256

      fda69ccb7e8acf085194e1359b1facf3b7c8f5b8eca43172a2a199d22aa675a9

    • SHA512

      69d4e041c83e2298c1c8f56a48dee9be249ae4ffbd84b75a94203015cfde21998b8f798798de55dd9ab1813550c2442d89a84e1586a65c8c96d8f64513353e43

    • SSDEEP

      24576:Rej8HegWnDJNfJJB8XWQ/zx7raihPUOOORYgZ:S8HfWDJNGXZ/Nra4rpOgZ

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Modifies Windows Defender Real-time Protection settings

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks