General

  • Target

    WZDigit.exe

  • Size

    124KB

  • Sample

    240515-afzr5afd6w

  • MD5

    6729bab9d61a9e66436e472e56c7f360

  • SHA1

    fb53f667b2179ad39a1add3160c83411ee78373f

  • SHA256

    20295fe79372b959b5556e11788a262a4f2cf4779b579df08b55757346a051e0

  • SHA512

    e952aaa3d05884e38cdf16fc4ac358a51adfb3dc14ade914768da483c8c8433c33620c907b13a84ae02672461b4396f5c48f32bc0093df60027d5a95e8c894b3

  • SSDEEP

    3072:MgTyxQbIWDpPuYrVfjfqm3H21NVK1TocPNRUYjENC+:7TymLPuYgm8jORL

Score
10/10

Malware Config

Extracted

Family

xworm

Mutex

�寬쇋YEORSF㠌MY൲⣓RS

Attributes
  • Install_directory

    %AppData%

  • install_file

    wz.exe

aes.plain

Targets

    • Target

      WZDigit.exe

    • Size

      124KB

    • MD5

      6729bab9d61a9e66436e472e56c7f360

    • SHA1

      fb53f667b2179ad39a1add3160c83411ee78373f

    • SHA256

      20295fe79372b959b5556e11788a262a4f2cf4779b579df08b55757346a051e0

    • SHA512

      e952aaa3d05884e38cdf16fc4ac358a51adfb3dc14ade914768da483c8c8433c33620c907b13a84ae02672461b4396f5c48f32bc0093df60027d5a95e8c894b3

    • SSDEEP

      3072:MgTyxQbIWDpPuYrVfjfqm3H21NVK1TocPNRUYjENC+:7TymLPuYgm8jORL

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks