General
-
Target
munchenclient.exe
-
Size
7.1MB
-
Sample
250124-1s5f9azrfx
-
MD5
84236243dcb77d4936dd6654575b1f6b
-
SHA1
4f0629caaed54ed3e5a73a1c88dec0c8a42d654e
-
SHA256
30beca0bcbc02bf77acdfdd698f38068699b06106aba6a05bdf83cab12572b64
-
SHA512
2838e47dde2e7fbe96d966de46491aa9955bd5bcbb567de474de71ab556dfa5335f796df6ec029d4d6b9e25c4be6e7a73d47552f1d1402859509827303c9eb7b
-
SSDEEP
196608:Pii9mneDatAEYUpkkAq0YmUjp5NHNpYUxx44:bAnmI/kk3mUjp59Nx
Static task
static1
Behavioral task
behavioral1
Sample
munchenclient.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
munchenclient.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
uIevzGILIGd901ZV
-
Install_directory
%AppData%
-
install_file
OneDrive Updater.exe
-
telegram
https://api.telegram.org/bot6813820189:AAEnLy9XOrfoO1MDfwUwZrxxour8yypLOhE
Targets
-
-
Target
munchenclient.exe
-
Size
7.1MB
-
MD5
84236243dcb77d4936dd6654575b1f6b
-
SHA1
4f0629caaed54ed3e5a73a1c88dec0c8a42d654e
-
SHA256
30beca0bcbc02bf77acdfdd698f38068699b06106aba6a05bdf83cab12572b64
-
SHA512
2838e47dde2e7fbe96d966de46491aa9955bd5bcbb567de474de71ab556dfa5335f796df6ec029d4d6b9e25c4be6e7a73d47552f1d1402859509827303c9eb7b
-
SSDEEP
196608:Pii9mneDatAEYUpkkAq0YmUjp5NHNpYUxx44:bAnmI/kk3mUjp59Nx
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3