General

  • Target

    Loader.bat

  • Size

    422KB

  • Sample

    240521-2pf5xscg3z

  • MD5

    e87e3e968e80526bc362bfdd1e4bf266

  • SHA1

    4fee6fa14c33b6de899cfd3cd9dc8fc9de2a1a7c

  • SHA256

    e5f8aa6ad4a268a2d8d5a7bf151dd9df36cf5a9fdcd76ee1bcfc357a245c3d2e

  • SHA512

    edd5bbcc9b42ff5535fc65adc28277255deffeaa7c1d8b4d4e0599a1d9df15f700a30a052ae991069f9bd3d2b9eede700fd202b282ebc8358c75d9175cfc8abd

  • SSDEEP

    12288:xTsiBZqGoi2wPrgGoBUUmCXb0imm9dJe/PN:tsi+GoQjUvGHN

Malware Config

Extracted

Family

xworm

C2

messages-gamespot.gl.at.ply.gg:55729

127.0.0.1:55729

Attributes
  • Install_directory

    %Temp%

  • install_file

    chrome.exe

Targets

    • Target

      Loader.bat

    • Size

      422KB

    • MD5

      e87e3e968e80526bc362bfdd1e4bf266

    • SHA1

      4fee6fa14c33b6de899cfd3cd9dc8fc9de2a1a7c

    • SHA256

      e5f8aa6ad4a268a2d8d5a7bf151dd9df36cf5a9fdcd76ee1bcfc357a245c3d2e

    • SHA512

      edd5bbcc9b42ff5535fc65adc28277255deffeaa7c1d8b4d4e0599a1d9df15f700a30a052ae991069f9bd3d2b9eede700fd202b282ebc8358c75d9175cfc8abd

    • SSDEEP

      12288:xTsiBZqGoi2wPrgGoBUUmCXb0imm9dJe/PN:tsi+GoQjUvGHN

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks