General

  • Target

    2024-05-23_1ec0c88dfca562ed46c709a1c419de33_hiddentear

  • Size

    135KB

  • Sample

    240523-arxf5sef9v

  • MD5

    1ec0c88dfca562ed46c709a1c419de33

  • SHA1

    9526addeea665e2eda3317b1980c76109791bbb2

  • SHA256

    607080540d6ce76e6370c912aee761a91c3e03f70f51dfc20eef728951ed0492

  • SHA512

    00dc1f8eff5aa617e801739f57f4bcf4d6a9be94501a7dbb0354dcd96704c9d8f389250de3d65d4835eb5a22131c58c844efd5d7640bd6426391d032bc51b0f4

  • SSDEEP

    3072:kl7GFd9MJOM6M+lmsolAIrRuw+mqv9j1MWLQI:kdYd9i+lDAA

Malware Config

Extracted

Family

xworm

Version

5.0

C2

posted-does.gl.at.ply.gg:53306

Mutex

LkUNP2Umn8LCsSHC

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      2024-05-23_1ec0c88dfca562ed46c709a1c419de33_hiddentear

    • Size

      135KB

    • MD5

      1ec0c88dfca562ed46c709a1c419de33

    • SHA1

      9526addeea665e2eda3317b1980c76109791bbb2

    • SHA256

      607080540d6ce76e6370c912aee761a91c3e03f70f51dfc20eef728951ed0492

    • SHA512

      00dc1f8eff5aa617e801739f57f4bcf4d6a9be94501a7dbb0354dcd96704c9d8f389250de3d65d4835eb5a22131c58c844efd5d7640bd6426391d032bc51b0f4

    • SSDEEP

      3072:kl7GFd9MJOM6M+lmsolAIrRuw+mqv9j1MWLQI:kdYd9i+lDAA

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Detects Windows executables referencing non-Windows User-Agents

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks