General
-
Target
Tutorial Files(1).txt
-
Size
2KB
-
Sample
250408-prgg9atq18
-
MD5
5600477fbd3d6bde63f31d2ceaf95d5a
-
SHA1
b2e700cad0d80e19ce84750ba55ca387f0bd4bf3
-
SHA256
6025d9decad215703487c83f75ccf9d5f528bed582ab809ddd117e372424dc72
-
SHA512
d8586a1daa7a9d73d1ee3cf72ac62f799ae687107ffcb83a7b6d766d6ed15b6ea46ab7f013a5461701f4af4f4aedb2391d3759030f3c0f26ba868efd3cf0053f
Static task
static1
Behavioral task
behavioral1
Sample
Tutorial Files(1).js
Resource
win11-20250313-en
Malware Config
Extracted
xworm
127.0.0.1:8789
25.ip.gl.ply.gg:8789
Smerttb-40118.portmap.host:40118
-
Install_directory
%AppData%
-
install_file
NursultanAlphaCRACK.exe
Extracted
silverrat
1.0.0.0
poemvktest-35591.portmap.host:35591
SilverMutex_TAGsfTCsGI
-
certificate
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
-
decrypted_key
-|S.S.S|-
-
discord
https://discord.com/api/webhooks/1322992422568988774/Gr0EREhEb8yzIslC-wewIO1-4b6g6iDIogbSUSF18iuad5eBl2l2KlTZ-g75HdigQIyD
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
eExSeERMcUJIRW93ak9jRU5CQkdnblREaFRFTnNl
-
payload_url
https://g.top4top.io/p_2522c7w8u1.png
-
reconnect_delay
4
-
server_signature
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
Targets
-
-
Target
Tutorial Files(1).txt
-
Size
2KB
-
MD5
5600477fbd3d6bde63f31d2ceaf95d5a
-
SHA1
b2e700cad0d80e19ce84750ba55ca387f0bd4bf3
-
SHA256
6025d9decad215703487c83f75ccf9d5f528bed582ab809ddd117e372424dc72
-
SHA512
d8586a1daa7a9d73d1ee3cf72ac62f799ae687107ffcb83a7b6d766d6ed15b6ea46ab7f013a5461701f4af4f4aedb2391d3759030f3c0f26ba868efd3cf0053f
-
Detect Xworm Payload
-
Silverrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xmrig family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
XMRig Miner payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Component Object Model Hijacking
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1