General

  • Target

    28c020b8cb635d2578b6a0287f9fb077d9156c5d1ae4c5edfff2b0f2a9d7af4f.vbs

  • Size

    2KB

  • Sample

    240213-c41ensda38

  • MD5

    1f0f7a4d9adacc6d3b6fb93bfe05f28e

  • SHA1

    ea643e625a401b7f7dd3d93dcd3eb414e71f5866

  • SHA256

    28c020b8cb635d2578b6a0287f9fb077d9156c5d1ae4c5edfff2b0f2a9d7af4f

  • SHA512

    dc8ff31f758f80cc734b84b0e575cc1f77871e0cd89faf5dd194371c0fdc6dbc70b04a7dfb7149a25f83d583ad3f845ab6a1f3f0715069c6c2dfa0e0841395b9

Malware Config

Extracted

Family

xworm

Version

3.1

C2

xwv5group7001.duckdns.org:7001

Mutex

mrkh245537gVoEKF

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      28c020b8cb635d2578b6a0287f9fb077d9156c5d1ae4c5edfff2b0f2a9d7af4f.vbs

    • Size

      2KB

    • MD5

      1f0f7a4d9adacc6d3b6fb93bfe05f28e

    • SHA1

      ea643e625a401b7f7dd3d93dcd3eb414e71f5866

    • SHA256

      28c020b8cb635d2578b6a0287f9fb077d9156c5d1ae4c5edfff2b0f2a9d7af4f

    • SHA512

      dc8ff31f758f80cc734b84b0e575cc1f77871e0cd89faf5dd194371c0fdc6dbc70b04a7dfb7149a25f83d583ad3f845ab6a1f3f0715069c6c2dfa0e0841395b9

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Detects Windows executables referencing non-Windows User-Agents

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks