General

  • Target

    BlitzedV12.rar

  • Size

    6.1MB

  • Sample

    250125-l5jmzsxrdx

  • MD5

    8e314e20dbcf8a39f70530acd4c310a0

  • SHA1

    4b3a0fb8c6a5af4d209bd191e9132f76d07586df

  • SHA256

    7191ca1e3053e459c10aec9281eeb98a94f36fa0134085b2c2386741a6e18f6b

  • SHA512

    4f1aadad72c154bc6c3747992d197b3da21aec0308298c9442bc8542aa374c0d15dc37641d549496d2c5f8b315951d475764e57b46ce74b2fac6607f73e76786

  • SSDEEP

    196608:BgSNHp3IT47kDX6bH8ZQMMdVx4lBqrk9zhu/EG:BPVdhQDX6bH8ZQMuHsBLc/N

Malware Config

Extracted

Family

xworm

Version

3.1

C2

stores-anytime.at.ply.gg:36673

Mutex

S2a8VYouw8L5LAad

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      BlitzedGrabberV12.exe

    • Size

      4.7MB

    • MD5

      f1417759e105ff9909ed454ad5db48a0

    • SHA1

      d8ff4cfa49616988882f1d4e6318db869acd75ce

    • SHA256

      966cee8682727f4f09d137b4924ec6daeb7c0b9dcb8b9700be8c3e73c57c6b60

    • SHA512

      e0359c601e59b56c1d5e324c85692b3f3db94adb1a2110c5fd3e6ab248475d27fa1f2aff86f57c0d99ae328cf4e68783a84af41049d7856c3b940ab6ef19b675

    • SSDEEP

      98304:hmVrrT79MEH/TSbOJfUhEpZlm5qqCabiiSXiBuxIr7n:h2rlMEfTa6fUWlQzCaWiIsX

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks