General

  • Target

    Freerubexgenpython.bat

  • Size

    268KB

  • Sample

    240428-ae8nmsbh2v

  • MD5

    08e71b8265c7b98e17894abe76a5d2d5

  • SHA1

    e5ab42da766a21f3fbd268e18949d8faac06d44b

  • SHA256

    5187903da5fbbdb1cde09db8f9716f9b4196f36ef9788e77f4c51bc2087b5762

  • SHA512

    d7e174c2d088da25b15a5bf11879586137bfe37bda060f96cb303cf4fc031b03edebacc33008379a2839fcaca2d5882120fb40d839f8e903fe8a61674bffe851

  • SSDEEP

    6144:1ZM4WQySKAs2GF6zmiSbv/ZIsDUU1XkUp/q9PKrjh2uAJ:Q43ySXYGwUHUF8SR2j

Malware Config

Extracted

Family

xworm

Version

5.0

C2

maximum-meet.gl.at.ply.gg:1675

Mutex

wFaGwEoNy1MFwQqv

Attributes
  • Install_directory

    %Temp%

  • install_file

    RuntimeBroker.exe

aes.plain

Targets

    • Target

      Freerubexgenpython.bat

    • Size

      268KB

    • MD5

      08e71b8265c7b98e17894abe76a5d2d5

    • SHA1

      e5ab42da766a21f3fbd268e18949d8faac06d44b

    • SHA256

      5187903da5fbbdb1cde09db8f9716f9b4196f36ef9788e77f4c51bc2087b5762

    • SHA512

      d7e174c2d088da25b15a5bf11879586137bfe37bda060f96cb303cf4fc031b03edebacc33008379a2839fcaca2d5882120fb40d839f8e903fe8a61674bffe851

    • SSDEEP

      6144:1ZM4WQySKAs2GF6zmiSbv/ZIsDUU1XkUp/q9PKrjh2uAJ:Q43ySXYGwUHUF8SR2j

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks