General

  • Target

    zap.cmd

  • Size

    6KB

  • Sample

    240523-t4w6pahd84

  • MD5

    0b65dcbdc755a516181f47d69f5aee10

  • SHA1

    fc9319ec254c2be1b7ba5174d36d142c1ce20440

  • SHA256

    00c866d489bd11732441171441b8db0a135c76bdb7bf5c3adb4da66e97dbed43

  • SHA512

    e37aba32337a5bf8793721d8d9b9582c906b9820ace2a831d1f6e9548e6631942df0bdf6b56f07c1420fa7ade2d3a1e34bb27cab4ddc7d57a42672919f1ead1c

  • SSDEEP

    96:vEWuwXqdcs0faFF/oW8NYEpyGakOwJyZLLi8lTxd7Qhn004g6bnecFhZ3WjS:vurF8NY8yGywAL2Ox5QV004gIFhn

Malware Config

Extracted

Family

xworm

Version

3.1

C2

xgmn934.duckdns.org:8896

Mutex

2utLZrxcByvppTdF

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      zap.cmd

    • Size

      6KB

    • MD5

      0b65dcbdc755a516181f47d69f5aee10

    • SHA1

      fc9319ec254c2be1b7ba5174d36d142c1ce20440

    • SHA256

      00c866d489bd11732441171441b8db0a135c76bdb7bf5c3adb4da66e97dbed43

    • SHA512

      e37aba32337a5bf8793721d8d9b9582c906b9820ace2a831d1f6e9548e6631942df0bdf6b56f07c1420fa7ade2d3a1e34bb27cab4ddc7d57a42672919f1ead1c

    • SSDEEP

      96:vEWuwXqdcs0faFF/oW8NYEpyGakOwJyZLLi8lTxd7Qhn004g6bnecFhZ3WjS:vurF8NY8yGywAL2Ox5QV004gIFhn

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Tasks