General

  • Target

    Tutorial Files(1).txt

  • Size

    2KB

  • Sample

    250408-prgg9atq18

  • MD5

    5600477fbd3d6bde63f31d2ceaf95d5a

  • SHA1

    b2e700cad0d80e19ce84750ba55ca387f0bd4bf3

  • SHA256

    6025d9decad215703487c83f75ccf9d5f528bed582ab809ddd117e372424dc72

  • SHA512

    d8586a1daa7a9d73d1ee3cf72ac62f799ae687107ffcb83a7b6d766d6ed15b6ea46ab7f013a5461701f4af4f4aedb2391d3759030f3c0f26ba868efd3cf0053f

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:8789

25.ip.gl.ply.gg:8789

Smerttb-40118.portmap.host:40118

Attributes
  • Install_directory

    %AppData%

  • install_file

    NursultanAlphaCRACK.exe

Extracted

Family

silverrat

Version

1.0.0.0

C2

poemvktest-35591.portmap.host:35591

Mutex

SilverMutex_TAGsfTCsGI

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • discord

    https://discord.com/api/webhooks/1322992422568988774/Gr0EREhEb8yzIslC-wewIO1-4b6g6iDIogbSUSF18iuad5eBl2l2KlTZ-g75HdigQIyD

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    eExSeERMcUJIRW93ak9jRU5CQkdnblREaFRFTnNl

  • payload_url

    https://g.top4top.io/p_2522c7w8u1.png

  • reconnect_delay

    4

  • server_signature

    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

Targets

    • Target

      Tutorial Files(1).txt

    • Size

      2KB

    • MD5

      5600477fbd3d6bde63f31d2ceaf95d5a

    • SHA1

      b2e700cad0d80e19ce84750ba55ca387f0bd4bf3

    • SHA256

      6025d9decad215703487c83f75ccf9d5f528bed582ab809ddd117e372424dc72

    • SHA512

      d8586a1daa7a9d73d1ee3cf72ac62f799ae687107ffcb83a7b6d766d6ed15b6ea46ab7f013a5461701f4af4f4aedb2391d3759030f3c0f26ba868efd3cf0053f

    • Detect Xworm Payload

    • SilverRat

      SilverRat is trojan written in C#.

    • Silverrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xmrig family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks