General

  • Target

    хуеглот.exe

  • Size

    146KB

  • Sample

    250327-1cvxwaysdy

  • MD5

    e7365a5ab13b26ef263c3655f397473d

  • SHA1

    afa25fa8e260e417c92299232d18c7e563de1162

  • SHA256

    fb5e59fbe17f28e69fc37c591ceb2dc8e4c617fe1c126a203ccbbe7eb82bbc8a

  • SHA512

    3efb3d82d963f7942bbcef8719f314b9fcb75120a8e8084c84aa4755c88eeb31d6227a0b4b80146cd05cced722a59a0c78d50e5a16f09215e7ab91c4f0e3e4fb

  • SSDEEP

    3072:aAd2EccyEhjH1TibfRUpFO9KVtnljw7oLF:ag7hjH1Ob59anl0M

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:62949

pidoras123131-62949.portmap.host:62949

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7812594920:AAF8LiE_BAgLbrCBoONka4W_igE0Wo_lUEg/sendMessage?chat_id=7101392896

Targets

    • Target

      хуеглот.exe

    • Size

      146KB

    • MD5

      e7365a5ab13b26ef263c3655f397473d

    • SHA1

      afa25fa8e260e417c92299232d18c7e563de1162

    • SHA256

      fb5e59fbe17f28e69fc37c591ceb2dc8e4c617fe1c126a203ccbbe7eb82bbc8a

    • SHA512

      3efb3d82d963f7942bbcef8719f314b9fcb75120a8e8084c84aa4755c88eeb31d6227a0b4b80146cd05cced722a59a0c78d50e5a16f09215e7ab91c4f0e3e4fb

    • SSDEEP

      3072:aAd2EccyEhjH1TibfRUpFO9KVtnljw7oLF:ag7hjH1Ob59anl0M

    • Detect Xworm Payload

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks