General

  • Target

    7f8e216231c8e0e57f4d6e06edb5c20fbed0cfa36c44058ad5809935c4a06448.zip

  • Size

    18KB

  • Sample

    230321-r515xsdf2s

  • MD5

    fb84c8e9f34fab452cd8d41f9928dfac

  • SHA1

    d1c119abdf5304cde8ed0b16d57cdc6e5e882836

  • SHA256

    b4cd8446b24c4458473a8b7e9fe81feddd2c9a73d0ddf532c0f0e8bc0a90202c

  • SHA512

    bae103ecd9d86c0357225e1f140ed780b57dc709e00638052b638b97c1a615240576c28a8c9d8888a34269828d5d44e7e02edf01f2c49705a51bd3e4a8d39176

  • SSDEEP

    384:egEvHskCwL6U3OXqkhn4a/LCgv8VY1G1o1f+bsEFo:DGMXwL6mUqBa/Ww8zo1UFo

Malware Config

Extracted

Family

xworm

C2

kids-abstract.at.ply.gg:26193

Mutex

Q0PQt1zJ8DDIXdji

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      7f8e216231c8e0e57f4d6e06edb5c20fbed0cfa36c44058ad5809935c4a06448.exe

    • Size

      38KB

    • MD5

      1077d2817de834e79983fa8bb6dde71e

    • SHA1

      f251d74238b838ce1605b889d80327a1e47e9a40

    • SHA256

      7f8e216231c8e0e57f4d6e06edb5c20fbed0cfa36c44058ad5809935c4a06448

    • SHA512

      3132c7690ddc33e6c8b7d9533f7b8500bfce540eeee61db706dcc4847d7dcf7634206fd8f04c437706e9412bb09c7706b016b8633c17661f322475046e5d1bba

    • SSDEEP

      768:z5B93liEMuoOzHEgSSxCa7wFWPh9Vi67Owhk9Fxkku:z5BM+NSda0FK9Vi67Owq72

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks