General
-
Target
steam.exe
-
Size
304KB
-
Sample
250126-wfbwyszjbn
-
MD5
6dd8012ed786bb6bd4a4242bee740013
-
SHA1
1bc4a05329bb192602c041c8ca3537ca291a38f0
-
SHA256
ee80ef1569a303b01f6d9fe4c6a3ca3940b5c0171ca285ee9eefdce70f5d1f12
-
SHA512
78800a5e8dcfdfe2655c1590d3548e62f3db1ba7c2a57f4cda99513a405e8c4d6dbf2a2e0826272d981f4dafc5542120f935ff1d18661bef89e98b8ca31e76c8
-
SSDEEP
6144:0zrI6x9U+GIIIIIIIhIIIIIIIIIIIIIIIU:oUC
Behavioral task
behavioral1
Sample
steam.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
sazgig.ddns.net:37467
mC1gvmENdCt930af
-
Install_directory
%LocalAppData%
-
install_file
minecraft.exe
Targets
-
-
Target
steam.exe
-
Size
304KB
-
MD5
6dd8012ed786bb6bd4a4242bee740013
-
SHA1
1bc4a05329bb192602c041c8ca3537ca291a38f0
-
SHA256
ee80ef1569a303b01f6d9fe4c6a3ca3940b5c0171ca285ee9eefdce70f5d1f12
-
SHA512
78800a5e8dcfdfe2655c1590d3548e62f3db1ba7c2a57f4cda99513a405e8c4d6dbf2a2e0826272d981f4dafc5542120f935ff1d18661bef89e98b8ca31e76c8
-
SSDEEP
6144:0zrI6x9U+GIIIIIIIhIIIIIIIIIIIIIIIU:oUC
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
UAC bypass
-
Xenarmor family
-
Xworm family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1