General
-
Target
Sapphire cracked.rar
-
Size
21.2MB
-
Sample
250124-e3z4mazkhz
-
MD5
f608f91e4c33f55ca812f0ea45ea9de5
-
SHA1
e5c6099ecb4508743d2c06ae8c6889b54fb0e413
-
SHA256
2f1e1ddd259e08981adaf33623c97bec1dcf34bd31712cc23fbec49a56c7c019
-
SHA512
5f94f14a34c9b4893ed4363c916ab02dd3949fcfd1e661b379c9849b2f4951a24213f54dc737739aaf2bd3e7d03e3de0b82d669fbdc133bfd2b9cce7328025d6
-
SSDEEP
393216:ZzlUG2B6c9auujELA+n7b7WbdLz4oUQGvN+LMX2f17Dpd+l+ETM1jGI:Z+jBh97uju7nWbdfW/v4eqVVsQ1jR
Static task
static1
Behavioral task
behavioral1
Sample
Sapphire cracked.rar
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
christian-betting.gl.at.ply.gg:48781
-
Install_directory
%ProgramData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7242122864:AAGtpRgIM7E1A3mlOYz1ioh5Jyg1HJtYIyg/sendMessage?chat_id=6229207397
Extracted
asyncrat
FUCKED BY CODEX17
105.100.184.221:38672
-
delay
3
-
install
true
-
install_file
Anti Malwer servise.exe
-
install_folder
%AppData%
Targets
-
-
Target
Sapphire cracked.rar
-
Size
21.2MB
-
MD5
f608f91e4c33f55ca812f0ea45ea9de5
-
SHA1
e5c6099ecb4508743d2c06ae8c6889b54fb0e413
-
SHA256
2f1e1ddd259e08981adaf33623c97bec1dcf34bd31712cc23fbec49a56c7c019
-
SHA512
5f94f14a34c9b4893ed4363c916ab02dd3949fcfd1e661b379c9849b2f4951a24213f54dc737739aaf2bd3e7d03e3de0b82d669fbdc133bfd2b9cce7328025d6
-
SSDEEP
393216:ZzlUG2B6c9auujELA+n7b7WbdLz4oUQGvN+LMX2f17Dpd+l+ETM1jGI:Z+jBh97uju7nWbdfW/v4eqVVsQ1jR
-
Asyncrat family
-
Detect Xworm Payload
-
Xworm family
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1