General
-
Target
250224-w9jtnaxqw7_pw_infected.zip
-
Size
16.9MB
-
Sample
250302-avjdpaxyb1
-
MD5
560392912801a789739dcfb266226f31
-
SHA1
503933de4c7205a07144f49560f636ea7afb5567
-
SHA256
d7676e38029789eb42452b343315be2187696c7432c3923281e961010c1c3913
-
SHA512
ca0cc8fa00c8d58dd5cd5330b33ea499dada4334c3595111d3a960ce850cf89837c0b8923418ad05d60e6a4be549a494390f553484ee229b136bb4511bf92b17
-
SSDEEP
393216:WVXqfO5xKJtoBZoqKeIwVtfxvfYst1rhdn2tCS6cFl+DJLc7xOuMO:UXqfjWoqKiVJJLrhd2cS12d2OuMO
Static task
static1
Behavioral task
behavioral1
Sample
Mega Spoofer perm and temp.exe
Resource
win11-20250217-en
Malware Config
Extracted
marsstealer
Default
Extracted
C:\Users\Public\Documents\RGNR_C33AEB1B.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
VQd9MfbX4V71RInT
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Mega Spoofer perm and temp.exe
-
Size
22.4MB
-
MD5
317c5fe16b5314d1921930e300d9ea39
-
SHA1
65eb02c735bbbf1faf212662539fbf88a00a271f
-
SHA256
d850d741582546a3d0ea2ad5d25e0766781f315cd37e6c58f7262df571cd0c40
-
SHA512
31751379ad7f6c55d87e9a5c1f56e6211d515b7d9ae055af962ed6f9205f5abad302c2e47dd56325abff85327ec3b7f9a6cf76ed34b8cbe1da06549c622c7031
-
SSDEEP
49152:yIT4lj7Rl9HFoDi+3JK5CS2bV5IRtyrp63FDysl28Wvp/pUOmrscrdXuMIgqJ95+:yI6
-
Detect Xworm Payload
-
Marsstealer family
-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Ragnarlocker family
-
Squirrelwaffle family
-
Xworm family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (2948) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Squirrelwaffle payload
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Pre-OS Boot
1Bootkit
1