General

  • Target

    f3473b6f9deb102a1cddf26c65783120_NEIKI

  • Size

    1.1MB

  • Sample

    240508-s42whaea85

  • MD5

    f3473b6f9deb102a1cddf26c65783120

  • SHA1

    1cc7214b5cdef7a9a6fb765bcddf103f3ad3a308

  • SHA256

    fde61cbf07762e5e4ad5514ab252005059893a8e09658a5fd2c25daa07e8e66a

  • SHA512

    7f55ed7db81f914a725c7488fd36d9e61522250a2c18a63767ec0c319d328aaf10fb06e396407f182fa0bdaba8f2d255ea25ff19a4dba8c25b2a955c7a24ee8b

  • SSDEEP

    24576:3Q4IhvVt27+AUbqhJNsxr396z+9Lg8iK6HZsNUtT:3CVt2C56JWtEU6HZsutT

Malware Config

Extracted

Family

xworm

C2

construction-sexually.gl.at.ply.gg:62210

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      f3473b6f9deb102a1cddf26c65783120_NEIKI

    • Size

      1.1MB

    • MD5

      f3473b6f9deb102a1cddf26c65783120

    • SHA1

      1cc7214b5cdef7a9a6fb765bcddf103f3ad3a308

    • SHA256

      fde61cbf07762e5e4ad5514ab252005059893a8e09658a5fd2c25daa07e8e66a

    • SHA512

      7f55ed7db81f914a725c7488fd36d9e61522250a2c18a63767ec0c319d328aaf10fb06e396407f182fa0bdaba8f2d255ea25ff19a4dba8c25b2a955c7a24ee8b

    • SSDEEP

      24576:3Q4IhvVt27+AUbqhJNsxr396z+9Lg8iK6HZsNUtT:3CVt2C56JWtEU6HZsutT

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks