General

  • Target

    file.vbs

  • Size

    72KB

  • Sample

    240523-twc3vahb27

  • MD5

    7c89c3540caaa52052018271109f6a9a

  • SHA1

    78c973d9ab8326fbbacb11b7c5d8492030f8e3c4

  • SHA256

    9fde917e0e590e34264a37918d73be9645301cd68793cf28bbb8430dd1a6fed2

  • SHA512

    83750d0d142d8f3b7a6ce6edb304576561e2d5db69b0e6afd088f24af4a1b00abf49224a5227b1106b39734fef18ed1c87f45b210d1ac989d496d59c685e3bf1

  • SSDEEP

    1536:+gcBy6Tr/S2UT3WnyhNZvaOh9jWoAYz1P74QhblEiAGTC:+qs7UTGncNZvX9K450Qx8GTC

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

xwormmom53.duckdns.org:8896

Mutex

EXwKoBFFWMorKcFJ

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      file.vbs

    • Size

      72KB

    • MD5

      7c89c3540caaa52052018271109f6a9a

    • SHA1

      78c973d9ab8326fbbacb11b7c5d8492030f8e3c4

    • SHA256

      9fde917e0e590e34264a37918d73be9645301cd68793cf28bbb8430dd1a6fed2

    • SHA512

      83750d0d142d8f3b7a6ce6edb304576561e2d5db69b0e6afd088f24af4a1b00abf49224a5227b1106b39734fef18ed1c87f45b210d1ac989d496d59c685e3bf1

    • SSDEEP

      1536:+gcBy6Tr/S2UT3WnyhNZvaOh9jWoAYz1P74QhblEiAGTC:+qs7UTGncNZvX9K450Qx8GTC

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks