General

  • Target

    https://cdn.discordapp.com/attachments/1220848495297040455/1222704976095346739/SystemSettings.rar?ex=66172fbf&is=6604babf&hm=2d51faba466038cfe7961a467a99cd6c7017fe3eb84b3f7799cea23f6c8986df&

  • Sample

    240328-ayakysca4t

Malware Config

Extracted

Family

xworm

Version

3.1

C2

authority-amazon.gl.at.ply.gg:41414

Mutex

oYHq0IAEGaCbJk3U

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Win 10.exe

aes.plain

Targets

    • Target

      https://cdn.discordapp.com/attachments/1220848495297040455/1222704976095346739/SystemSettings.rar?ex=66172fbf&is=6604babf&hm=2d51faba466038cfe7961a467a99cd6c7017fe3eb84b3f7799cea23f6c8986df&

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks