General
-
Target
SRTWARE Loader V3.exe
-
Size
1.0MB
-
Sample
250124-rt82dsvjdk
-
MD5
ad5d4726b0307aac731ca80af721ce9c
-
SHA1
25b2c8026d5c61e0af3b6524a25fd24c314a9c11
-
SHA256
11cb607716d3e18afa73c4043c9ba692911063497aa914d75514e3f174378097
-
SHA512
a9d74477cfa175e532dafe940da68ad8cb2db7854c50b78a7a4b5dcf34cd983a60affce76b8da08f06b3ff5eeca38a0439b2aa31d6da8199735fa4071418b55f
-
SSDEEP
24576:c0Xgd58ynSporPDu6rqe4UrkVrg8AuSTmTviqmS:c0Xe8qxrPy6me/keTYiq
Static task
static1
Behavioral task
behavioral1
Sample
SRTWARE Loader V3.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
SRTWARE Loader V3.exe
-
Size
1.0MB
-
MD5
ad5d4726b0307aac731ca80af721ce9c
-
SHA1
25b2c8026d5c61e0af3b6524a25fd24c314a9c11
-
SHA256
11cb607716d3e18afa73c4043c9ba692911063497aa914d75514e3f174378097
-
SHA512
a9d74477cfa175e532dafe940da68ad8cb2db7854c50b78a7a4b5dcf34cd983a60affce76b8da08f06b3ff5eeca38a0439b2aa31d6da8199735fa4071418b55f
-
SSDEEP
24576:c0Xgd58ynSporPDu6rqe4UrkVrg8AuSTmTviqmS:c0Xe8qxrPy6me/keTYiq
-
Detect Xworm Payload
-
Xworm family
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3