General

  • Target

    Sapphire cracked.rar

  • Size

    21.2MB

  • Sample

    250124-e3z4mazkhz

  • MD5

    f608f91e4c33f55ca812f0ea45ea9de5

  • SHA1

    e5c6099ecb4508743d2c06ae8c6889b54fb0e413

  • SHA256

    2f1e1ddd259e08981adaf33623c97bec1dcf34bd31712cc23fbec49a56c7c019

  • SHA512

    5f94f14a34c9b4893ed4363c916ab02dd3949fcfd1e661b379c9849b2f4951a24213f54dc737739aaf2bd3e7d03e3de0b82d669fbdc133bfd2b9cce7328025d6

  • SSDEEP

    393216:ZzlUG2B6c9auujELA+n7b7WbdLz4oUQGvN+LMX2f17Dpd+l+ETM1jGI:Z+jBh97uju7nWbdfW/v4eqVVsQ1jR

Malware Config

Extracted

Family

xworm

C2

christian-betting.gl.at.ply.gg:48781

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7242122864:AAGtpRgIM7E1A3mlOYz1ioh5Jyg1HJtYIyg/sendMessage?chat_id=6229207397

Extracted

Family

asyncrat

Botnet

FUCKED BY CODEX17

C2

105.100.184.221:38672

Attributes
  • delay

    3

  • install

    true

  • install_file

    Anti Malwer servise.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Sapphire cracked.rar

    • Size

      21.2MB

    • MD5

      f608f91e4c33f55ca812f0ea45ea9de5

    • SHA1

      e5c6099ecb4508743d2c06ae8c6889b54fb0e413

    • SHA256

      2f1e1ddd259e08981adaf33623c97bec1dcf34bd31712cc23fbec49a56c7c019

    • SHA512

      5f94f14a34c9b4893ed4363c916ab02dd3949fcfd1e661b379c9849b2f4951a24213f54dc737739aaf2bd3e7d03e3de0b82d669fbdc133bfd2b9cce7328025d6

    • SSDEEP

      393216:ZzlUG2B6c9auujELA+n7b7WbdLz4oUQGvN+LMX2f17Dpd+l+ETM1jGI:Z+jBh97uju7nWbdfW/v4eqVVsQ1jR

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks