General

  • Target

    CLONER Discord V2.exe

  • Size

    8.2MB

  • Sample

    240703-qb91asxbra

  • MD5

    374fa995d6c74848ca5a4a1fcf96ebf8

  • SHA1

    8af4205a385176304ff6aa4a0cdd6c23f15c295f

  • SHA256

    706d5626cba45815db76ee8870567afdd29da1a73c92b43538e3c2df102d0e3d

  • SHA512

    348f9df65273803e03571e9d72d106bf81a90d4bb1755e20d3d14d5a52f355b4f966c49125fb2b5f3e496f74d20b1a806726844e8043e9e937405b17a0dc3396

  • SSDEEP

    196608:q11nXalG7bPwCK8iyclpIRpAUgLUscV/86r2KUIC0qQz0uQ:k1XCG7K8iNSpPjsGr2ZCz0L

Malware Config

Extracted

Family

xworm

Version

5.0

C2

code-celtic.gl.at.ply.gg:28208

Mutex

GSgDG7OoA7WQiQRL

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      CLONER Discord V2.exe

    • Size

      8.2MB

    • MD5

      374fa995d6c74848ca5a4a1fcf96ebf8

    • SHA1

      8af4205a385176304ff6aa4a0cdd6c23f15c295f

    • SHA256

      706d5626cba45815db76ee8870567afdd29da1a73c92b43538e3c2df102d0e3d

    • SHA512

      348f9df65273803e03571e9d72d106bf81a90d4bb1755e20d3d14d5a52f355b4f966c49125fb2b5f3e496f74d20b1a806726844e8043e9e937405b17a0dc3396

    • SSDEEP

      196608:q11nXalG7bPwCK8iyclpIRpAUgLUscV/86r2KUIC0qQz0uQ:k1XCG7K8iNSpPjsGr2ZCz0L

    • Detect Neshta payload

    • Detect Xworm Payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks