General

  • Target

    b887dda496a30dfd43e84698a30644c0_NeikiAnalytics

  • Size

    129KB

  • Sample

    240516-hxgxmshc5w

  • MD5

    b887dda496a30dfd43e84698a30644c0

  • SHA1

    0b980093b5070242b084b055a3f7a1f40f155f00

  • SHA256

    13cc8e9fd7e7ce1f7839c165ffa0f2133a8ce1569bbe73d8fb40036fbf2f8a2a

  • SHA512

    710e0d9748bc8b07fa355529b4bce18c31bf52614bb1a3084864cf04c498944ddb62e152598dd13745cad847447ad12ca9499bb915a164d1862b24c8954a9da6

  • SSDEEP

    3072:xPECaLOqPbCoE3/a64IgQOhMdx6xepw76:xP4Jbk3/VgKx6xep

Malware Config

Extracted

Family

xworm

C2

87.209.104.248:4400

Attributes
  • Install_directory

    %AppData%

  • install_file

    WindowsDefender.exe

Targets

    • Target

      b887dda496a30dfd43e84698a30644c0_NeikiAnalytics

    • Size

      129KB

    • MD5

      b887dda496a30dfd43e84698a30644c0

    • SHA1

      0b980093b5070242b084b055a3f7a1f40f155f00

    • SHA256

      13cc8e9fd7e7ce1f7839c165ffa0f2133a8ce1569bbe73d8fb40036fbf2f8a2a

    • SHA512

      710e0d9748bc8b07fa355529b4bce18c31bf52614bb1a3084864cf04c498944ddb62e152598dd13745cad847447ad12ca9499bb915a164d1862b24c8954a9da6

    • SSDEEP

      3072:xPECaLOqPbCoE3/a64IgQOhMdx6xepw76:xP4Jbk3/VgKx6xep

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks