General

  • Target

    1fd71232174da2918c3417bbe1be55ce6491b5920a1447fdbc7d48914d75a8d2_NeikiAnalytics

  • Size

    297KB

  • Sample

    240521-jwkgtadg44

  • MD5

    37777b049a8d9fa1a9395478f453cb80

  • SHA1

    ca02bfe0836a20578d64877c37ccae93f512367d

  • SHA256

    1fd71232174da2918c3417bbe1be55ce6491b5920a1447fdbc7d48914d75a8d2

  • SHA512

    419ca6e4452597d9ba651cb93912dff01a56c2aaf81a31f8f1708f9d53551f938bf7626c1553e71a6159c0eddef9a6924b04e1a901dc87911f364bfedbf5fd39

  • SSDEEP

    6144:m3mFWIDUl5bKkmWi053mFWIDUl5bKkmWi0JYGh5:m3mFbhkmWi053mFbhkmWi0/z

Malware Config

Extracted

Family

xworm

C2

77.51.217.123:5552

Attributes
  • Install_directory

    %AppData%

  • install_file

    Microsoft Network Realtime Inspection Service.exe

  • telegram

    https://api.telegram.org/bot6839974672:AAH9skWg6wzrK69lQAYnjPEGUFTBPsO_3nc/sendMessage?chat_id=6983445707

Targets

    • Target

      1fd71232174da2918c3417bbe1be55ce6491b5920a1447fdbc7d48914d75a8d2_NeikiAnalytics

    • Size

      297KB

    • MD5

      37777b049a8d9fa1a9395478f453cb80

    • SHA1

      ca02bfe0836a20578d64877c37ccae93f512367d

    • SHA256

      1fd71232174da2918c3417bbe1be55ce6491b5920a1447fdbc7d48914d75a8d2

    • SHA512

      419ca6e4452597d9ba651cb93912dff01a56c2aaf81a31f8f1708f9d53551f938bf7626c1553e71a6159c0eddef9a6924b04e1a901dc87911f364bfedbf5fd39

    • SSDEEP

      6144:m3mFWIDUl5bKkmWi053mFWIDUl5bKkmWi0JYGh5:m3mFbhkmWi053mFbhkmWi0/z

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks