General

  • Target

    UnbanMethod (1).vbs

  • Size

    89KB

  • Sample

    240326-x9qgwadc5z

  • MD5

    72cf206b269b2c0b9e3a601f97b9ab8e

  • SHA1

    1bc8a24ad5c25193a3c29eabf92a6ed0e3a16e85

  • SHA256

    d4822834f2b795a73ea0c7bb96ffab5cde0bd6c6416448a58bdbee2d96b205ba

  • SHA512

    cfff2a766553e77455bcc29400b62765a0eff9639720a6929fe1b27512d1a68e174907c2c49bcd57993cd0d7226815eb73af808d01377e71d1b6af59fdb92482

  • SSDEEP

    1536:U6QBB7uew9rguJQNAdoPBurCM4khS/GL6aVh4HgHH5o3zweI:U6QH7Jw9vKAd7ODkhSsZVak5o3zwL

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/MUARtvHT

Targets

    • Target

      UnbanMethod (1).vbs

    • Size

      89KB

    • MD5

      72cf206b269b2c0b9e3a601f97b9ab8e

    • SHA1

      1bc8a24ad5c25193a3c29eabf92a6ed0e3a16e85

    • SHA256

      d4822834f2b795a73ea0c7bb96ffab5cde0bd6c6416448a58bdbee2d96b205ba

    • SHA512

      cfff2a766553e77455bcc29400b62765a0eff9639720a6929fe1b27512d1a68e174907c2c49bcd57993cd0d7226815eb73af808d01377e71d1b6af59fdb92482

    • SSDEEP

      1536:U6QBB7uew9rguJQNAdoPBurCM4khS/GL6aVh4HgHH5o3zweI:U6QH7Jw9vKAd7ODkhSsZVak5o3zwL

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Modifies Installed Components in the registry

    • Drops startup file

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks