General

  • Target

    623547849.vbs

  • Size

    210KB

  • Sample

    240509-g5gfeaha86

  • MD5

    86d5dcbeeeca8b8b5702e414678a95ee

  • SHA1

    2bd15186a1120f5b222c3eeb6e56530b25bff151

  • SHA256

    0d59e429f0d2acf46b9b2400651cae8ca032b62932bad8e39d7a1465ac49e36b

  • SHA512

    e67238280029e78981495ee9f757a373a2588d47c4c55a248064535ae0bc75c3cc6900c811e10e1941478e0b40dfacac73573e9de0110a1163fdf23a678bb42f

  • SSDEEP

    1536:ben2+mzXdn8l22d99CObidCocEW1aJK66n5yhtW0/5JpWn4cNIg0BfbUZlu9gISw:b2do9JK6X/vcmg0Bfc37P8

Malware Config

Extracted

Family

xworm

Version

3.1

C2

xmay8000.duckdns.org:8000

Mutex

1xahivGykLCNnHwa

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      623547849.vbs

    • Size

      210KB

    • MD5

      86d5dcbeeeca8b8b5702e414678a95ee

    • SHA1

      2bd15186a1120f5b222c3eeb6e56530b25bff151

    • SHA256

      0d59e429f0d2acf46b9b2400651cae8ca032b62932bad8e39d7a1465ac49e36b

    • SHA512

      e67238280029e78981495ee9f757a373a2588d47c4c55a248064535ae0bc75c3cc6900c811e10e1941478e0b40dfacac73573e9de0110a1163fdf23a678bb42f

    • SSDEEP

      1536:ben2+mzXdn8l22d99CObidCocEW1aJK66n5yhtW0/5JpWn4cNIg0BfbUZlu9gISw:b2do9JK6X/vcmg0Bfc37P8

    • Detect Xworm Payload

    • Detect ZGRat V1

    • Xworm

      Xworm is a remote access trojan written in C#.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks