General

  • Target

    читы.exe

  • Size

    105KB

  • Sample

    240529-pj3qhseh53

  • MD5

    7c4229f56dd1abf353b7615e099cb3a8

  • SHA1

    f1a2545b0d9b1f686d456c60fcd87c3c4ee93d08

  • SHA256

    2d0936804bfa8aedd998cbfb27485f1816222f17921d14705e390c5622b232ad

  • SHA512

    e961a5a7b44fdfc0cbdedbb48320afa5097c8ff5f7d1880069e4120ee0bfe2d0642d3b7b7977c815c6f96b9c0f66028f26a2a0bfcdef5cca363269dff780af41

  • SSDEEP

    3072:ydqfxEp09Xt1m+b1pNkLP+uOoo9wmfAn1W0cgte8:ydq5F9HbvNkK4oPAng0ct

Malware Config

Extracted

Family

xworm

C2

advertise-located.gl.at.ply.gg:54921

19.ip.gl.ply.gg:54921

XWorm V5.2:123

Attributes
  • Install_directory

    %AppData%

  • install_file

    Delta.exe

Targets

    • Target

      читы.exe

    • Size

      105KB

    • MD5

      7c4229f56dd1abf353b7615e099cb3a8

    • SHA1

      f1a2545b0d9b1f686d456c60fcd87c3c4ee93d08

    • SHA256

      2d0936804bfa8aedd998cbfb27485f1816222f17921d14705e390c5622b232ad

    • SHA512

      e961a5a7b44fdfc0cbdedbb48320afa5097c8ff5f7d1880069e4120ee0bfe2d0642d3b7b7977c815c6f96b9c0f66028f26a2a0bfcdef5cca363269dff780af41

    • SSDEEP

      3072:ydqfxEp09Xt1m+b1pNkLP+uOoo9wmfAn1W0cgte8:ydq5F9HbvNkK4oPAng0ct

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks