General

  • Target

    https://cdn.discordapp.com/attachments/1222639326429450270/1222709913583620117/SystemSettings.rar?ex=66173458&is=6604bf58&hm=f47ff53bebd27871ee9d1577be1d9e499fb3f250d889f71b9c6ac1de24878386&

  • Sample

    240328-a8jllshh28

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

C2

authority-amazon.gl.at.ply.gg:41414

Mutex

oYHq0IAEGaCbJk3U

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Win 10.exe

aes.plain

Targets

    • Target

      https://cdn.discordapp.com/attachments/1222639326429450270/1222709913583620117/SystemSettings.rar?ex=66173458&is=6604bf58&hm=f47ff53bebd27871ee9d1577be1d9e499fb3f250d889f71b9c6ac1de24878386&

    Score
    10/10
    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks