General

  • Target

    TestLoader.exe

  • Size

    181KB

  • Sample

    250207-3b459ssrgv

  • MD5

    3a58bbafb76707b770bfd32b71dec1ea

  • SHA1

    782127a6ee74082671963b26dcfb95ae0cc3b218

  • SHA256

    7eb139dfd20e9e10a245d1dee02efd7d109bf84578dc200af354fed8ad4752dc

  • SHA512

    ea168fa4318dcea0077462f7cb4c4907e7857d17f4b01b76c96633da1a89ea05b65f4e87cf18b7c2c88eb2801a769a27cbabab3c531b6aedbcaac322ab9c401a

  • SSDEEP

    3072:wHfBELxl/i6/hkRZltsKuNCjQutKbtVK6bpfSJYacv:w5ELxla6GbWUq8Y

Malware Config

Extracted

Family

xworm

C2

138.124.58.209:5555

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    sscore.exe

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7944456076:AAGpjhHLrlnhpd2D6D-Z8494fRloZ5j7GY0/sendDocument

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7944456076:AAGpjhHLrlnhpd2D6D-Z8494fRloZ5j7GY0/sendDocumen

Targets

    • Target

      TestLoader.exe

    • Size

      181KB

    • MD5

      3a58bbafb76707b770bfd32b71dec1ea

    • SHA1

      782127a6ee74082671963b26dcfb95ae0cc3b218

    • SHA256

      7eb139dfd20e9e10a245d1dee02efd7d109bf84578dc200af354fed8ad4752dc

    • SHA512

      ea168fa4318dcea0077462f7cb4c4907e7857d17f4b01b76c96633da1a89ea05b65f4e87cf18b7c2c88eb2801a769a27cbabab3c531b6aedbcaac322ab9c401a

    • SSDEEP

      3072:wHfBELxl/i6/hkRZltsKuNCjQutKbtVK6bpfSJYacv:w5ELxla6GbWUq8Y

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Windows security bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

MITRE ATT&CK Enterprise v15

Tasks