General

  • Target

    Dropper (infected).zip

  • Size

    97.8MB

  • Sample

    250306-m5nsdawygz

  • MD5

    f9ee5bf8fae4aa5658b763c5ce0c9242

  • SHA1

    96017dc377cd35713c93d4d6b219a4c051e6b84f

  • SHA256

    992e1b04e74323754e32bbbe30ea47a14d0c9f2f99d6502de74b2717afa11d96

  • SHA512

    31f3e9f6e2ad41a45c26f5ed540c598ca38d674e682dc3ec35cf3bf57772e1399e06c1b49d39167ea08a456d916d106c3e60384ffa33976b5b543fcc494b6dbf

  • SSDEEP

    1572864:sphvKBNwglDlQe3AN52BMyt5meS8XnAIWsVSJkfpKr4G464w2j/EAigkXDhk:sphvKHwglDlve2atQjt+kyL2EAHkThk

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://envs.sh/E3L.exe

Extracted

Family

xworm

C2

abstract-respond.gl.at.ply.gg:32953

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Windows Defender.exe

Targets

    • Target

      PDQ.exe

    • Size

      98.0MB

    • MD5

      be2b5bf1035e68a780e62b0144f02f53

    • SHA1

      0bc89eb756819cf816f52b2378ad7243dce0f65a

    • SHA256

      98a48e68768486746f7eec87a16cebd0021d2e885a6b68b2574407898cb04457

    • SHA512

      59b6386acae2299cf72e5ff3114bff013bb97f4d8f3b8388825acc7d681519b7f7a5854048b3855fa84af2914811947827cb49f6998d7a285341a3abdeda7642

    • SSDEEP

      3145728:oHhFswX+P6BJOTM8bk8KxJkagkCI/8rd2:oHROP6BalkkadbSU

    • Detect Xworm Payload

    • Xmrig family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks