General

  • Target

    CrackLauncher.exe

  • Size

    17.5MB

  • Sample

    250123-ss54satnhs

  • MD5

    186878f03c828104ae806baba96aeb97

  • SHA1

    1913e0299b2fc42f275b13cac435b78e3b6f37df

  • SHA256

    55268aba21741e673432fd0008b19725a32191a14212cff94440a2df4e0f92fe

  • SHA512

    b9e4c4109ea9386d394d72e6dfcf3d4a020ba2591844dfe114482e50d72613e6c7b32ec2c40606bc63c9185d8728c115587897ddb3379bc09cdf4b5ec8737ad8

  • SSDEEP

    393216:aquA/JFQOEKdqGdVgT7uOPXtWV0HVvvoP7cI/NG1CMkCCk3BrS:apMKOEKd9dK7uOPXtW8otAwMkCCuB2

Malware Config

Extracted

Family

xworm

C2

Ymniiz-29322.portmap.host:29322

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    svchost.exe

Targets

    • Target

      CrackLauncher.exe

    • Size

      17.5MB

    • MD5

      186878f03c828104ae806baba96aeb97

    • SHA1

      1913e0299b2fc42f275b13cac435b78e3b6f37df

    • SHA256

      55268aba21741e673432fd0008b19725a32191a14212cff94440a2df4e0f92fe

    • SHA512

      b9e4c4109ea9386d394d72e6dfcf3d4a020ba2591844dfe114482e50d72613e6c7b32ec2c40606bc63c9185d8728c115587897ddb3379bc09cdf4b5ec8737ad8

    • SSDEEP

      393216:aquA/JFQOEKdqGdVgT7uOPXtWV0HVvvoP7cI/NG1CMkCCk3BrS:apMKOEKd9dK7uOPXtW8otAwMkCCuB2

    • Detect Xworm Payload

    • Njrat family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.