Resubmissions

27-01-2025 18:13

250127-wt52ys1ldl 10

26-01-2025 18:42

250126-xcbbpazjax 10

General

  • Target

    PlainX.Crypter.zip

  • Size

    13.0MB

  • Sample

    250126-xcbbpazjax

  • MD5

    e10e5d43fd0d1ffaff35f5992916204f

  • SHA1

    8b0f6bbfdba45cf09a56b553a1684c5717f1cf2a

  • SHA256

    0bc0e4ad660c382f3291d9cff6e43e4e4f2a6875678b8557bf237f2ef5360eb8

  • SHA512

    4f85ee02468327eab59202f4db325437e9636f7104f751619f642cf7f3eadb34952132d64d55dfee6d7635d94b21b8dba0e35ba62af5856f69aa238bc080c1bb

  • SSDEEP

    393216:SrNev055XcxGsyF37u/md7uB1tzfSyhMO:SrVjXUG3kmd7uB1tzfSyiO

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot7204924753:AAFaqmmBR9ybp4-iE8BA2YCiFNUbOEd0Ljk/sendMessage?chat_id=

Attributes

Extracted

Family

xworm

Version

5.0

Mutex

OnCH8EVI1tYADuXo

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    msedge.exe

  • pastebin_url

    https://pastebin.com/raw/RPPi3ByL

  • telegram

    https://api.telegram.org/bot7483240807:AAEYFrBoMgquxWoikOe9bVlqmoMC2b2AOO4/sendMessage?chat_id=5279018187

aes.plain
aes.plain
aes.plain

Targets

    • Target

      PlainX Crypter.exe

    • Size

      13.1MB

    • MD5

      e02070f24247621be04948fefe100a81

    • SHA1

      e41afedf121e07b6598355562fdf5725a5dc4064

    • SHA256

      d087091be3376d85fc1d39523f82ebe1d01b7ac4e4d10f1855f374498fddcc71

    • SHA512

      ca39dbf2f1b9a6d3071e2d18e51ed9d5f222ed4155721faebcf72c2aad929607a027eaf5d1f0942d4c6827260ff3be6d2516e5d4f26a7fd0e53eb5e39a261dfc

    • SSDEEP

      196608:M9dla9WjVQJz4JuRuVXt7teDDT5A0GJLz8o2Z/NA1cV1zoXfKNPqxTP6fHrCoz/B:M9dfdXtWDT5no2Z1Wcb0IPuC/r/ya+8

    • Detect Xworm Payload

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Stealerium family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks