General

  • Target

    Stand.Launchpad.exe

  • Size

    101KB

  • Sample

    240601-ed8dpshe74

  • MD5

    1876cff7742d4df6149e00b4abf78425

  • SHA1

    5e81c297afedde245a5e4f3835021659cf541f65

  • SHA256

    a83142b28be6ce5e81cd2fa3bdf2e8679d2d1b79de2eaa0df59fde1a0e2ee032

  • SHA512

    a6dfabf8ba1a7ffbe20fabb12cf964ea3eca04f2115a1f312c7e02daef0c3824947c15e53cab2cf91a01b6945d689d8ce8bb47eee4f39a4e0d8b62292c47722c

  • SSDEEP

    1536:DYQxEiKnGBYp11Kf4eGPCbr4/Audh5F6NNCJOJxxV:DHmpb8f4eGabrqhANWOJrV

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:43107

Name1442-43107.portmap.host:43107

Attributes
  • Install_directory

    %Temp%

  • install_file

    Stand.exe

Targets

    • Target

      Stand.Launchpad.exe

    • Size

      101KB

    • MD5

      1876cff7742d4df6149e00b4abf78425

    • SHA1

      5e81c297afedde245a5e4f3835021659cf541f65

    • SHA256

      a83142b28be6ce5e81cd2fa3bdf2e8679d2d1b79de2eaa0df59fde1a0e2ee032

    • SHA512

      a6dfabf8ba1a7ffbe20fabb12cf964ea3eca04f2115a1f312c7e02daef0c3824947c15e53cab2cf91a01b6945d689d8ce8bb47eee4f39a4e0d8b62292c47722c

    • SSDEEP

      1536:DYQxEiKnGBYp11Kf4eGPCbr4/Audh5F6NNCJOJxxV:DHmpb8f4eGabrqhANWOJrV

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks