General

  • Target

    aquatic.zip

  • Size

    33.0MB

  • Sample

    250202-q84vjswqal

  • MD5

    84bcfcf87857034605867f2ffbf9e4d5

  • SHA1

    64d5517098246d906f5412e746767c2179ab5095

  • SHA256

    1b3be3019f94a15556df2cbd0448537152b48c812485f4160c8bd508b0d0c651

  • SHA512

    9eb89beb719f9222670fd38e3ba3ad27254261e5672b4ef0ab57eeae2e9997eed95b1d7723a8465be4b045c81694103f0a6a8b5fd907dc92cee34470e80201c4

  • SSDEEP

    786432:9y7JN0EH8j2ow+j09T+lfw3h90vOi59PDoc:9y705r0N+dw3h9oOi59Psc

Malware Config

Extracted

Family

xworm

Version

5.0

C2

testarosa.duckdns.org:7110

Mutex

5ZpeoOe6AtQfr6wU

Attributes
  • Install_directory

    %AppData%

  • install_file

    Ondrive.exe

aes.plain

Targets

    • Target

      aquatic/crack.dll

    • Size

      5.1MB

    • MD5

      fe7dc4218e47f5c31e7a2db9b2e55ddd

    • SHA1

      6d30688097e87755b5d59429e5dfb9ce0562f931

    • SHA256

      1cbaa9f954edae2e9a6ccac8e0119ff533ee01b42b1bb24fa10adfa80064b780

    • SHA512

      922048e800411cb7f21618647b88b0d8b5c98aa45a55eb8ab66a838f3900bed6e03cd247e27af0b304bd4b71fa6402d1b88aa320aa4c23a42088a1617dac73c7

    • SSDEEP

      98304:ZvNYCYPKFV3CIz5igBo6qO90Pqp8YVH/6yG/fdmjLdGGf:ZvyWLNia90S7iyb

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Target

      aquatic/loader.exe

    • Size

      5.2MB

    • MD5

      c136329a989aad9543c913f9197a01fe

    • SHA1

      0b3bdab50947cf330243938c9ccb3e685c43457b

    • SHA256

      9b802ef1b1e58a521a45dbd45c48c75c5b7f9ac53b273d6d2cf868c1f6d46885

    • SHA512

      fa7a7efa10b4da760b7d281aa235fa4bb4ce28d12796f28632fd653ae184a6f09bc796c18ba1aa3253f713af0334d97f040dc762a8a1d25352dc7308d49b8590

    • SSDEEP

      98304:fKYhdZRJ8os9WXz/DsEAE4SfTQ3+5wJCn9cK4KwrUWxeNVSreDGknLjiSXBI:CYhdo0D/D1J8+mM9Y/gNIsGkLj

    • Detect Umbral payload

    • Detect Xworm Payload

    • Njrat family

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      aquatic/main.exe

    • Size

      24.1MB

    • MD5

      c4639a9dd4fa418a1e2e5537b9a53bfe

    • SHA1

      9fea0f4615170667aa59dac92f6d424455b5fc54

    • SHA256

      6548853e51522d28bc2d4ee6dbecdfe7be496462cb87f26587f830374ce07ec7

    • SHA512

      2e5f53a2d4bae0028ecb715485327db9da7aeb45176e7e54db039516dab6002f41b5f44ae728f7752ee840f34b14ac78698cea3bc4cc2d00ea815873bad6b692

    • SSDEEP

      786432:8Ljr7FsBzlI0ecXYc1xk/cBFG8zv7NRDZPA:oezlI1kLxJBFGu7HFY

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks