General
-
Target
Pyslock.exe
-
Size
21.6MB
-
Sample
250304-eash3sywht
-
MD5
a0ffac14736ead083c36a978369b87ba
-
SHA1
8da2f697b7b65ebdf21b94c1d1f0185d1d48f3e5
-
SHA256
7dd25fd3fbb87266948a407b91285c4b07bb46f9bf26f3c1a7d2a5ed4ce9cd3b
-
SHA512
29c5cc95e51f7ef17b0df944207d6fa3e8d94f9e84bb0b6026d8a7f131e6c7287b78aac18e50f521fd064b2832a64cecc54bce83507d4cd6bd4b718347f78aeb
-
SSDEEP
393216:k6f15y6xVG+dvbs5u+5vFA3MLwCbe6q5WpsealMvjm3AjjyXHm2dj+sasBC:1FGmsQ+50MLbbe0seeB3AjjF2BksBC
Static task
static1
Behavioral task
behavioral1
Sample
Pyslock.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Pyslock.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
5.0
1VeDwfujGeaxOsgJ
-
install_file
USB.exe
Extracted
njrat
im523
MjRm MULTI
data-center.gotdns.ch:5552
0f11a0ab2753081a6848acab26509810
-
reg_key
0f11a0ab2753081a6848acab26509810
-
splitter
|'|'|
Targets
-
-
Target
Pyslock.exe
-
Size
21.6MB
-
MD5
a0ffac14736ead083c36a978369b87ba
-
SHA1
8da2f697b7b65ebdf21b94c1d1f0185d1d48f3e5
-
SHA256
7dd25fd3fbb87266948a407b91285c4b07bb46f9bf26f3c1a7d2a5ed4ce9cd3b
-
SHA512
29c5cc95e51f7ef17b0df944207d6fa3e8d94f9e84bb0b6026d8a7f131e6c7287b78aac18e50f521fd064b2832a64cecc54bce83507d4cd6bd4b718347f78aeb
-
SSDEEP
393216:k6f15y6xVG+dvbs5u+5vFA3MLwCbe6q5WpsealMvjm3AjjyXHm2dj+sasBC:1FGmsQ+50MLbbe0seeB3AjjF2BksBC
-
Detect Xworm Payload
-
Njrat family
-
UAC bypass
-
Xworm family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1