General

  • Target

    Stupid Monkey.exe

  • Size

    70KB

  • Sample

    250124-lfmncasqfr

  • MD5

    4c785ba0487bfec51faf4788d564ee9f

  • SHA1

    786fdc994a71d7e02a556e3f720b41a096a789f5

  • SHA256

    c81ae973db641e3c60912166be8979a60b95253ae290c145b9a2133ad7a2ebb8

  • SHA512

    b6b7fbd58e1c3657a81d17a974fc609c1af29dab6489685d2eea5e1397e12853c17086a537f7607aef6833f358965788adc961b44eeff21530ff89f9776eee06

  • SSDEEP

    1536:X7eLuJn1XH70d76kbDD0k2jF16K7HmTzOt5YP:X79hpb0YkbDLE57HmTzOts

Malware Config

Extracted

Family

xworm

C2

wood-matches.gl.at.ply.gg:23086

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMzMDMyNzc3MjM3NTAyNzgxMg.GWNm0N.hjhDXtec3jd5n3sEjWHGfGyOO28kBaPWiS-HPA

  • server_id

    1330267614202560512

Targets

    • Target

      Stupid Monkey.exe

    • Size

      70KB

    • MD5

      4c785ba0487bfec51faf4788d564ee9f

    • SHA1

      786fdc994a71d7e02a556e3f720b41a096a789f5

    • SHA256

      c81ae973db641e3c60912166be8979a60b95253ae290c145b9a2133ad7a2ebb8

    • SHA512

      b6b7fbd58e1c3657a81d17a974fc609c1af29dab6489685d2eea5e1397e12853c17086a537f7607aef6833f358965788adc961b44eeff21530ff89f9776eee06

    • SSDEEP

      1536:X7eLuJn1XH70d76kbDD0k2jF16K7HmTzOt5YP:X79hpb0YkbDLE57HmTzOts

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks