General

  • Target

    https://cdn.discordapp.com/attachments/947898779963650048/1071880860929904690/fjdgsaifgdsaudfpoijnuisabfodistriopzwrmsofdsjgnbd.exe

  • Sample

    230206-r911qahg4v

Malware Config

Extracted

Family

xworm

C2

Dejvicek-62577.portmap.io:62577

Mutex

auXZ3WTfErO6YyqP

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      https://cdn.discordapp.com/attachments/947898779963650048/1071880860929904690/fjdgsaifgdsaudfpoijnuisabfodistriopzwrmsofdsjgnbd.exe

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Tasks