General

  • Target

    test.exe

  • Size

    140KB

  • Sample

    240420-ph4anagf24

  • MD5

    b2a4fa40f85cc8b5c66ff6bb6cc7b7ef

  • SHA1

    57477ff6b2c5b45442a771e621db0688b15c72cf

  • SHA256

    b8517dfc87a24a2364ec2f742af3d2c88ad216b0cd2acba632284fd10ce5bcdd

  • SHA512

    323b2f2a03bcbc1788eb97af0f5d8824fb5c4caff7c5d5c1f00ee367965d4fe3fc62816a558ca5cb15baf2d6dba3200c72f757455488e7927e28ebe93e136a0e

  • SSDEEP

    1536:2NFL9pWbY0KkughQMSSCuzqbMLO0m9m6J4+XOiu2L+W1He4z:2NFL9gbYKQM8IqbM653XOiuDsh

Malware Config

Extracted

Family

xworm

C2

yet-musicians.gl.at.ply.gg:27619

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    discord.exe

Targets

    • Target

      test.exe

    • Size

      140KB

    • MD5

      b2a4fa40f85cc8b5c66ff6bb6cc7b7ef

    • SHA1

      57477ff6b2c5b45442a771e621db0688b15c72cf

    • SHA256

      b8517dfc87a24a2364ec2f742af3d2c88ad216b0cd2acba632284fd10ce5bcdd

    • SHA512

      323b2f2a03bcbc1788eb97af0f5d8824fb5c4caff7c5d5c1f00ee367965d4fe3fc62816a558ca5cb15baf2d6dba3200c72f757455488e7927e28ebe93e136a0e

    • SSDEEP

      1536:2NFL9pWbY0KkughQMSSCuzqbMLO0m9m6J4+XOiu2L+W1He4z:2NFL9gbYKQM8IqbM653XOiuDsh

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks