Resubmissions

01-07-2024 15:37

240701-s2vz6ssajn 10

01-07-2024 15:16

240701-snwdsa1gmm 10

01-07-2024 11:15

240701-nctzcsycjd 10

01-07-2024 11:04

240701-m6mxga1dnn 10

01-07-2024 09:11

240701-k5xzyawfpr 10

01-07-2024 09:08

240701-k3z2hsweqn 3

01-07-2024 09:03

240701-k1emsswdqq 10

01-07-2024 09:02

240701-kzrkzawdnn 10

30-06-2024 16:46

240630-vagdtathjl 10

General

  • Target

    Eagles Image Logger.exe

  • Size

    6.5MB

  • Sample

    240701-k5xzyawfpr

  • MD5

    822f47134b780406c02c48e1cdab2e38

  • SHA1

    aa1c4a7b46223f663c8a8751fd3b295ab6443263

  • SHA256

    15eb341d2ff1866160269470ef52df4889a17d2ca58476a77d0c2787845888b1

  • SHA512

    652d6160ce92af854c865351f4b754d528c4493917bb1c4d54d629cf145ab006447cdc493953636acc18a1be078b06307cdac335ae0aa598a21c7d3832e0a818

  • SSDEEP

    196608:vwSbstG7ykI+gHJnHgZcrOSrGymujAoWeVO:vKG7vI+gpnKnQGyXAod

Malware Config

Extracted

Family

xworm

C2

bulletingmarrano-45523.portmap.host:45523

Attributes
  • Install_directory

    %AppData%

  • install_file

    RuntimeBroker.exe

Targets

    • Target

      Eagles Image Logger.exe

    • Size

      6.5MB

    • MD5

      822f47134b780406c02c48e1cdab2e38

    • SHA1

      aa1c4a7b46223f663c8a8751fd3b295ab6443263

    • SHA256

      15eb341d2ff1866160269470ef52df4889a17d2ca58476a77d0c2787845888b1

    • SHA512

      652d6160ce92af854c865351f4b754d528c4493917bb1c4d54d629cf145ab006447cdc493953636acc18a1be078b06307cdac335ae0aa598a21c7d3832e0a818

    • SSDEEP

      196608:vwSbstG7ykI+gHJnHgZcrOSrGymujAoWeVO:vKG7vI+gpnKnQGyXAod

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks