General

  • Target

    6663d561874fb21e3bd67c9e68f09ac0_NeikiAnalytics.exe

  • Size

    40KB

  • Sample

    240523-kkzb9sba56

  • MD5

    6663d561874fb21e3bd67c9e68f09ac0

  • SHA1

    9f8ad93ba4e60844250d624e25a8d421281c6d94

  • SHA256

    a8cfdcf2308be48989bc7993ceb61e0ecb7930f8a154b2e5d2c78f2f5a5c3802

  • SHA512

    8ff50e5aa96e6600663b8e0935548c8cd1477b0c483c2f7ba0f8808ad6a21c48eb7655c87daeda6695d4ea4cc0db26161e1367eb712f67fb199c26bc5fcc3c6f

  • SSDEEP

    768:vNfPMSk3K/EzTb/UpX8WuFZ4ZJF5PC9O95C68OMhq3/Ok:lf05a/CTjuX89wFc9UI68OMET

Malware Config

Extracted

Family

xworm

Version

5.0

C2

156.225.129.219:7000

Mutex

LOfxNhTNVvGzuUp6

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      6663d561874fb21e3bd67c9e68f09ac0_NeikiAnalytics.exe

    • Size

      40KB

    • MD5

      6663d561874fb21e3bd67c9e68f09ac0

    • SHA1

      9f8ad93ba4e60844250d624e25a8d421281c6d94

    • SHA256

      a8cfdcf2308be48989bc7993ceb61e0ecb7930f8a154b2e5d2c78f2f5a5c3802

    • SHA512

      8ff50e5aa96e6600663b8e0935548c8cd1477b0c483c2f7ba0f8808ad6a21c48eb7655c87daeda6695d4ea4cc0db26161e1367eb712f67fb199c26bc5fcc3c6f

    • SSDEEP

      768:vNfPMSk3K/EzTb/UpX8WuFZ4ZJF5PC9O95C68OMhq3/Ok:lf05a/CTjuX89wFc9UI68OMET

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks