General

  • Target

    Minecraft.exe

  • Size

    61KB

  • Sample

    240531-xv9xzaah22

  • MD5

    ebaf38949ddaf75042b5680707117745

  • SHA1

    b1e45ef043bd2dbf4d2c3511bc3a8b742f4f237e

  • SHA256

    bdb400432a963d7557a75735f5ece80ec87720f49d074bbfc9b29b67a454c0b8

  • SHA512

    34997d945013294d4c3fa42dc0ad99435fd6848184cf4a2dcdfa35b2c1aa849f4d4d96267663c38c7a805548b92bba973cb28bcb136377b06335cad2695ab3c1

  • SSDEEP

    1536:pH1CZ+08luVQamx7SXrb1k8J++86JaOtkEIdT:pH1C9qaU+rbiEPaOtkrdT

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    RtkAudUService64.exe

  • pastebin_url

    https://pastebin.com/raw/U86ZFi0F

Targets

    • Target

      Minecraft.exe

    • Size

      61KB

    • MD5

      ebaf38949ddaf75042b5680707117745

    • SHA1

      b1e45ef043bd2dbf4d2c3511bc3a8b742f4f237e

    • SHA256

      bdb400432a963d7557a75735f5ece80ec87720f49d074bbfc9b29b67a454c0b8

    • SHA512

      34997d945013294d4c3fa42dc0ad99435fd6848184cf4a2dcdfa35b2c1aa849f4d4d96267663c38c7a805548b92bba973cb28bcb136377b06335cad2695ab3c1

    • SSDEEP

      1536:pH1CZ+08luVQamx7SXrb1k8J++86JaOtkEIdT:pH1C9qaU+rbiEPaOtkrdT

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks