General

  • Target

    Dropper.exe

  • Size

    130KB

  • Sample

    240515-ld13ysba2v

  • MD5

    f5506ffbf34168afb8dc1d12d08a38fc

  • SHA1

    4062954622406a6e29c52d31dea192c79f7fe7bf

  • SHA256

    018c780a107fe4c716e1f20814f821bee4571f2059b8efed53fafe31cea3d671

  • SHA512

    e455aa92a43b0946945ee22d93b50ed9dcd7dc0c2f0e02132d4bcb1c0b67c90a132c7372f293c2292a925564cbc44050fa4830934aeb4422147905a2462716ed

  • SSDEEP

    1536:K1KTRyrsnRpBgO7JL+97UCnDCZI31QocZaROflkfe970KqwGzlbP3BEA89wtHc:K1U4whj67KqH5bP8B

Malware Config

Extracted

Family

xworm

Version

5.0

C2

san-periods.gl.at.ply.gg:45994

Mutex

1BUzRXFjTnB3BgEr

Attributes
  • Install_directory

    %AppData%

  • install_file

    svvhost.exe

aes.plain

Targets

    • Target

      Dropper.exe

    • Size

      130KB

    • MD5

      f5506ffbf34168afb8dc1d12d08a38fc

    • SHA1

      4062954622406a6e29c52d31dea192c79f7fe7bf

    • SHA256

      018c780a107fe4c716e1f20814f821bee4571f2059b8efed53fafe31cea3d671

    • SHA512

      e455aa92a43b0946945ee22d93b50ed9dcd7dc0c2f0e02132d4bcb1c0b67c90a132c7372f293c2292a925564cbc44050fa4830934aeb4422147905a2462716ed

    • SSDEEP

      1536:K1KTRyrsnRpBgO7JL+97UCnDCZI31QocZaROflkfe970KqwGzlbP3BEA89wtHc:K1U4whj67KqH5bP8B

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Possible privilege escalation attempt

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Modifies file permissions

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks