General

  • Target

    https://necrocracked.sell.app/invoice/1530332/deliverable?signature=faf2a849ce78cae616f381cea417cf99a53b4581d99e8931297cac3d7696f947

  • Sample

    240420-r2wq2abd6w

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Public%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/UWpQULMP

Targets

    • Target

      https://necrocracked.sell.app/invoice/1530332/deliverable?signature=faf2a849ce78cae616f381cea417cf99a53b4581d99e8931297cac3d7696f947

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks