General
-
Target
CrackLauncher.exe
-
Size
17.5MB
-
Sample
250123-sq44pstncs
-
MD5
186878f03c828104ae806baba96aeb97
-
SHA1
1913e0299b2fc42f275b13cac435b78e3b6f37df
-
SHA256
55268aba21741e673432fd0008b19725a32191a14212cff94440a2df4e0f92fe
-
SHA512
b9e4c4109ea9386d394d72e6dfcf3d4a020ba2591844dfe114482e50d72613e6c7b32ec2c40606bc63c9185d8728c115587897ddb3379bc09cdf4b5ec8737ad8
-
SSDEEP
393216:aquA/JFQOEKdqGdVgT7uOPXtWV0HVvvoP7cI/NG1CMkCCk3BrS:apMKOEKd9dK7uOPXtW8otAwMkCCuB2
Malware Config
Extracted
xworm
Ymniiz-29322.portmap.host:29322
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Targets
-
-
Target
CrackLauncher.exe
-
Size
17.5MB
-
MD5
186878f03c828104ae806baba96aeb97
-
SHA1
1913e0299b2fc42f275b13cac435b78e3b6f37df
-
SHA256
55268aba21741e673432fd0008b19725a32191a14212cff94440a2df4e0f92fe
-
SHA512
b9e4c4109ea9386d394d72e6dfcf3d4a020ba2591844dfe114482e50d72613e6c7b32ec2c40606bc63c9185d8728c115587897ddb3379bc09cdf4b5ec8737ad8
-
SSDEEP
393216:aquA/JFQOEKdqGdVgT7uOPXtWV0HVvvoP7cI/NG1CMkCCk3BrS:apMKOEKd9dK7uOPXtW8otAwMkCCuB2
-
Detect Xworm Payload
-
Njrat family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-