General

  • Target

    12321322t.exe

  • Size

    179KB

  • Sample

    240428-ktnbcscc6y

  • MD5

    dcbea894f1718ad8e2cb8f11a5a02873

  • SHA1

    fc7aec8cb527214f51b5d3802ea738e471286891

  • SHA256

    9f1ba2fc004b5a54dd3f8de04c0b46ba4d390d070602a8e305f208f0bf2101aa

  • SHA512

    0cdc5255b365115a8b00e8c11945e6878b11495c3b967242313292a8752523bfeb5da181454ffa4b50ee2967483a08a11ec46fdeb3889b3eec2ae4515cff9d71

  • SSDEEP

    3072:eA+VEU0zNHNb774OtEFU4NpVq8BxFRzaqF+o2GQJ7/JzqVfGva:eNExzNtbeUgVqwlL

Malware Config

Extracted

Family

xworm

C2

shown-knows.gl.at.ply.gg:37886

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      12321322t.exe

    • Size

      179KB

    • MD5

      dcbea894f1718ad8e2cb8f11a5a02873

    • SHA1

      fc7aec8cb527214f51b5d3802ea738e471286891

    • SHA256

      9f1ba2fc004b5a54dd3f8de04c0b46ba4d390d070602a8e305f208f0bf2101aa

    • SHA512

      0cdc5255b365115a8b00e8c11945e6878b11495c3b967242313292a8752523bfeb5da181454ffa4b50ee2967483a08a11ec46fdeb3889b3eec2ae4515cff9d71

    • SSDEEP

      3072:eA+VEU0zNHNb774OtEFU4NpVq8BxFRzaqF+o2GQJ7/JzqVfGva:eNExzNtbeUgVqwlL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks