General

  • Target

    SimpleMinecraftDDOS.Setup.exe

  • Size

    78.1MB

  • Sample

    250305-rxvyya1sdy

  • MD5

    3aa6b5236e93bedc366c986474e6717b

  • SHA1

    89d0305ea9961ab31512ad3d149553a583b8b3cc

  • SHA256

    68d7882cfaa96136abb3a10a109ffbc58d3ab173a4e9fd77061d65b7832df5de

  • SHA512

    a8c5ffe2f497dafca54bd8389cff99bdbcab7931b6e8c0513dd6f7bcf54597d40ac446a97d31911269838c6f5eedade357b464d838d48720320c7fb622940575

  • SSDEEP

    1572864:YRDr+0KGDNx/EPwvbS+1bhWwDlpg/zuTT4lmfD6bP5rLtL57vZYPorfSnK:wr+0KGDN5ww2QVWwxpg/zIslm7A5HZpm

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe

exe.dropper

https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat

Extracted

Family

xworm

Attributes
  • Install_directory

    %port%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/J42c6s7r

Targets

    • Target

      SimpleMinecraftDDOS.Setup.exe

    • Size

      78.1MB

    • MD5

      3aa6b5236e93bedc366c986474e6717b

    • SHA1

      89d0305ea9961ab31512ad3d149553a583b8b3cc

    • SHA256

      68d7882cfaa96136abb3a10a109ffbc58d3ab173a4e9fd77061d65b7832df5de

    • SHA512

      a8c5ffe2f497dafca54bd8389cff99bdbcab7931b6e8c0513dd6f7bcf54597d40ac446a97d31911269838c6f5eedade357b464d838d48720320c7fb622940575

    • SSDEEP

      1572864:YRDr+0KGDNx/EPwvbS+1bhWwDlpg/zuTT4lmfD6bP5rLtL57vZYPorfSnK:wr+0KGDN5ww2QVWwxpg/zIslm7A5HZpm

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks