General

  • Target

    AntiCheat.exe

  • Size

    65KB

  • Sample

    240522-xdds7sce68

  • MD5

    ecf14cc5ff0424515577c9a2c5c3f778

  • SHA1

    d91bdfe875552295fa07bf53da7ea3775b409006

  • SHA256

    a1715115f4e541c7c69235aa8dc446857e5d6dbc1d4f28c7b4cf72122bad0248

  • SHA512

    b57df6f7c05573dc0b612dacaf164486e19a0183683a06ef6c01a317bf98e16101cba1dd54c405e09ae0afc1868b42079a52cbbed2e8db8dcaf8f6f6661148b1

  • SSDEEP

    1536:Vs4ew6fIj+QcTE80/uv2VV4bUOvCCj46oSpy9FfyWXaOe80R5z:OhQbueYbUZyy9F6WqOt0R5z

Malware Config

Extracted

Family

xworm

C2

weeks-deployment.gl.at.ply.gg:56058

Attributes
  • Install_directory

    %AppData%

  • install_file

    System32.exe

Targets

    • Target

      AntiCheat.exe

    • Size

      65KB

    • MD5

      ecf14cc5ff0424515577c9a2c5c3f778

    • SHA1

      d91bdfe875552295fa07bf53da7ea3775b409006

    • SHA256

      a1715115f4e541c7c69235aa8dc446857e5d6dbc1d4f28c7b4cf72122bad0248

    • SHA512

      b57df6f7c05573dc0b612dacaf164486e19a0183683a06ef6c01a317bf98e16101cba1dd54c405e09ae0afc1868b42079a52cbbed2e8db8dcaf8f6f6661148b1

    • SSDEEP

      1536:Vs4ew6fIj+QcTE80/uv2VV4bUOvCCj46oSpy9FfyWXaOe80R5z:OhQbueYbUZyy9F6WqOt0R5z

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks