General

  • Target

    171523950843d0d4ce6c771e6c6c7e64ceb935c0ded947946ed906a36bcb7bb77c7c48d03e458.dat-decoded

  • Size

    33KB

  • Sample

    240509-h9rmlsae73

  • MD5

    ba41ffb3d8d33fc940d337c90f3fa129

  • SHA1

    93c693aca2a53054d66df2f26e0c15cbecc62ceb

  • SHA256

    6dc37cfbcc9f41c8854ce46505f0ca6e09d15c3147510e5e15f95dcfdf941108

  • SHA512

    b2d7c9ca27c6dcc1d3cea04b4b0c591c90254dc8d84ddc031c27a87e8b5e8e8b43ab0d083a295ca8471491b9a2b8a52ada608c60184f56edba2decac0055615b

  • SSDEEP

    768:P4fK1pDGkptwyZScCBSUapNgqlDU/kZB+Bcg4tlTF592JO9huSURP:vDGkptwyZScCkU4rNUsZIB54HF592JOq

Malware Config

Extracted

Family

xworm

Version

3.1

C2

xmay8000.duckdns.org:8000

Mutex

1xahivGykLCNnHwa

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      171523950843d0d4ce6c771e6c6c7e64ceb935c0ded947946ed906a36bcb7bb77c7c48d03e458.dat-decoded

    • Size

      33KB

    • MD5

      ba41ffb3d8d33fc940d337c90f3fa129

    • SHA1

      93c693aca2a53054d66df2f26e0c15cbecc62ceb

    • SHA256

      6dc37cfbcc9f41c8854ce46505f0ca6e09d15c3147510e5e15f95dcfdf941108

    • SHA512

      b2d7c9ca27c6dcc1d3cea04b4b0c591c90254dc8d84ddc031c27a87e8b5e8e8b43ab0d083a295ca8471491b9a2b8a52ada608c60184f56edba2decac0055615b

    • SSDEEP

      768:P4fK1pDGkptwyZScCBSUapNgqlDU/kZB+Bcg4tlTF592JO9huSURP:vDGkptwyZScCkU4rNUsZIB54HF592JOq

    • Detect Xworm Payload

    • Detect ZGRat V1

    • Xworm

      Xworm is a remote access trojan written in C#.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks