General

  • Target

    Anarchy Panel 4.7.zip

  • Size

    57.2MB

  • Sample

    250419-v5mjbassgy

  • MD5

    f13bc330083490c9ca567a79fe547b63

  • SHA1

    7ae4f71eb33117560549edfd72561690f5b7eefe

  • SHA256

    724d909c4a7ebcc801556a07515580cc5b94835b679025dfd2e93ae4daa52a6e

  • SHA512

    72bb8c25e42d129fe5629558daca81063f44595b6b537f7a89d5dcd714aa80ae6b9506c9535dc15d8ff1b7a3c93c4efd682fa24d3f93e80101a0180400d67e27

  • SSDEEP

    1572864:mEoS2u5sfIxy4ZMqSTalcSthTv9mMior/Tx:JoS2u5WXuRZDzxiOx

Malware Config

Extracted

Family

xworm

C2

146.190.110.91:3389

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot7023899363:AAFEzgbfWzhyE32Lf95TKSRYEYXMd4AfMyk/sendMessage?chat_id=6354844663

Targets

    • Target

      Anarchy Panel‌.exe

    • Size

      49.4MB

    • MD5

      74d39916f4ebbfcdee4cf195e46077ad

    • SHA1

      fbcf304987a10dbe39a2960d159925ea58fbb81b

    • SHA256

      2e573c63103eff21009151b8b8873bd8d3f4e2d652ecc5166318f46a5c5459e2

    • SHA512

      f2f6cedda76f7d2f9284ad39a755a197ad4ce65b05365275f9317c51ec5dc9d82633cf87d4daf0ff0182fd128aa12941f88da9f91b57245955c8550d42fd9b42

    • SSDEEP

      786432:Lvr2wDJKwdqdue40MYj5l6EkkOPF2gIToqgSOKGPzN9qCoaByOy:Lj2hoiTM651kZ0gIToFSO9PzN9qUyO

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v16

Tasks