General

  • Target

    проверка.exe

  • Size

    102KB

  • Sample

    240530-l8tbladh81

  • MD5

    58174445e23753c941d39dc0453ac348

  • SHA1

    40e3a9047c49cbae6818297adcd03896d28364c2

  • SHA256

    1e5034d37e7751fb4039157219aee679bf76a8d3b0185a86c0d2255477a58171

  • SHA512

    523ef9adae27b83d87166be13e87944d3816cad08103b65ae2c964bf8828c0c949030e9e967d56b2bf40bba5b9466f8e4d21ccc220892c5f9365e2dd221fe072

  • SSDEEP

    1536:oBFpc8Z5dGYzabvawh+/C6vSX/QOcy/WPPqUs/uoDjSBSc7UtYVL:oa85dGCabvaw4/moOcy/R/1W0cgteL

Malware Config

Extracted

Family

xworm

C2

19.ip.gl.ply.gg:65468

speed-wheat.gl.at.ply.gg:65468

XWorm V5.2:123

Attributes
  • Install_directory

    %AppData%

  • install_file

    Delta.exe

Targets

    • Target

      проверка.exe

    • Size

      102KB

    • MD5

      58174445e23753c941d39dc0453ac348

    • SHA1

      40e3a9047c49cbae6818297adcd03896d28364c2

    • SHA256

      1e5034d37e7751fb4039157219aee679bf76a8d3b0185a86c0d2255477a58171

    • SHA512

      523ef9adae27b83d87166be13e87944d3816cad08103b65ae2c964bf8828c0c949030e9e967d56b2bf40bba5b9466f8e4d21ccc220892c5f9365e2dd221fe072

    • SSDEEP

      1536:oBFpc8Z5dGYzabvawh+/C6vSX/QOcy/WPPqUs/uoDjSBSc7UtYVL:oa85dGCabvaw4/moOcy/R/1W0cgteL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks