General

  • Target

    Xpub updated.exe

  • Size

    1.0MB

  • Sample

    231111-sv4czaab26

  • MD5

    25c2bf24f3b8f423a4181c7f67ae50b5

  • SHA1

    2190d3faa60c34fc4b9a237bba9abac14fc28021

  • SHA256

    713970f3fdf9d2d5a7819c8a84731f331277c7c75f1b88b60c22fabc9f2e2159

  • SHA512

    2f5d0e84db21fe25d3c3e5c647f12b8b292411682514d19d55ccfa0491b8d279872a1866e2af685b870a752be84cf2f1b56f40c37afb3e2cf1135fbbc4fe9cf7

  • SSDEEP

    24576:nyhVzcJg9bxWnM8/uGu7Gzw/Fe552DydluAqYOn+YRD331:yHxl8/q7JFxglVqLnBD331

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

6dscd9NcNiKn8WNo

Attributes
  • Install_directory

    %AppData%

  • install_file

    $k.exe

  • pastebin_url

    https://pastebin.com/raw/s2R3Fsug

aes.plain

Targets

    • Target

      Xpub updated.exe

    • Size

      1.0MB

    • MD5

      25c2bf24f3b8f423a4181c7f67ae50b5

    • SHA1

      2190d3faa60c34fc4b9a237bba9abac14fc28021

    • SHA256

      713970f3fdf9d2d5a7819c8a84731f331277c7c75f1b88b60c22fabc9f2e2159

    • SHA512

      2f5d0e84db21fe25d3c3e5c647f12b8b292411682514d19d55ccfa0491b8d279872a1866e2af685b870a752be84cf2f1b56f40c37afb3e2cf1135fbbc4fe9cf7

    • SSDEEP

      24576:nyhVzcJg9bxWnM8/uGu7Gzw/Fe552DydluAqYOn+YRD331:yHxl8/q7JFxglVqLnBD331

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks