General

  • Target

    чит.exe

  • Size

    357KB

  • Sample

    240511-jft2badh5w

  • MD5

    bd6d062cca54d61661e7c67343e6ecbe

  • SHA1

    e58f101d29b6525676ae97ecf98c654d5b9d2d13

  • SHA256

    5e5f7e691250577c8d5a5037a797960ad7f12bba85d62400e482d1050b5bbd77

  • SHA512

    727311a904693f2c467d2c752b3e3a2c21d067e71bb34a6722f2d7e0db50b48d17416712e1448495cff0edd759b0b0f875654c70aa0ac8f3c9ba03d622838095

  • SSDEEP

    6144:lPkN4bN8fMNPg+GIIIIIIIhIIIIIIIIIIIIIIIU:9k5fMNPD

Malware Config

Extracted

Family

xworm

C2

0.tcp.ngrok.io:14338

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    USB.exe

Targets

    • Target

      чит.exe

    • Size

      357KB

    • MD5

      bd6d062cca54d61661e7c67343e6ecbe

    • SHA1

      e58f101d29b6525676ae97ecf98c654d5b9d2d13

    • SHA256

      5e5f7e691250577c8d5a5037a797960ad7f12bba85d62400e482d1050b5bbd77

    • SHA512

      727311a904693f2c467d2c752b3e3a2c21d067e71bb34a6722f2d7e0db50b48d17416712e1448495cff0edd759b0b0f875654c70aa0ac8f3c9ba03d622838095

    • SSDEEP

      6144:lPkN4bN8fMNPg+GIIIIIIIhIIIIIIIIIIIIIIIU:9k5fMNPD

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks