General

  • Target

  • Size

    496KB

  • Sample

    250213-mkna4sxmaz

  • MD5

    ca43984bc9574b8f5af508c4f48d8dd5

  • SHA1

    0737a7a9ef6926c14da0d36f3a5212b93c6873a8

  • SHA256

    6cadc3f6fb39a43ba42a2f4039582c0821bca45ab9cf8ac6e44287f9862aca3f

  • SHA512

    b0e97b13a1683af914b5e395df94ea9d06ef4f5d155cb7fbfff8d4f8f8a1f5ef3b510d5dcee07ecf0d403490b33c1e6c47f9acfcf9469b6f9c72360cf7ae3769

  • SSDEEP

    12288:QXIKvF8VExLMgUR1YvgpC/H/u022/ZN0JVtgUb48td7J:c8VkLMTBYHu022hN0f11td7J

Malware Config

Extracted

Family

xworm

C2

that-mortgages.gl.at.ply.gg:8888

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7081348414:AAEQqhREW9-Pc1-aeS5a2NxfTFybIlvMOhk/sendMessage?chat_id=6426180826

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7081348414:AAEQqhREW9-Pc1-aeS5a2NxfTFybIlvMOhk/sendMessage?chat_id=6426180826

Targets

    • Target

    • Size

      496KB

    • MD5

      ca43984bc9574b8f5af508c4f48d8dd5

    • SHA1

      0737a7a9ef6926c14da0d36f3a5212b93c6873a8

    • SHA256

      6cadc3f6fb39a43ba42a2f4039582c0821bca45ab9cf8ac6e44287f9862aca3f

    • SHA512

      b0e97b13a1683af914b5e395df94ea9d06ef4f5d155cb7fbfff8d4f8f8a1f5ef3b510d5dcee07ecf0d403490b33c1e6c47f9acfcf9469b6f9c72360cf7ae3769

    • SSDEEP

      12288:QXIKvF8VExLMgUR1YvgpC/H/u022/ZN0JVtgUb48td7J:c8VkLMTBYHu022hN0f11td7J

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Modifies Windows Defender DisableAntiSpyware settings

    • Windows security bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Sets desktop wallpaper using registry

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks