General

  • Target

    Bot-Launcher.exe

  • Size

    111KB

  • Sample

    240602-tqepgshb93

  • MD5

    6b26d020d23abcdf1afdb9fa178023a1

  • SHA1

    d317779ac4ecc99cff0355bea2a27f8548611908

  • SHA256

    16d7446eb4de11842219292ee940933356638595d8a51b793a26257cc614c04b

  • SHA512

    91164b3571c1e39d11dc663b6c314ede43e9c62f296dbc4c5521e6372c6099505e8d7a15469243d2f193db0bced089599d579a2ea1b9776a1a4bbb8b1bfce112

  • SSDEEP

    1536:sJtH7E+U6+bCVdp6CBHL976xbRrQJmVcTQOagfvMzSqm6DeYCV87IUiYCNW4M:oIbC5x97amUjWGI1C

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/Jt9Xgc6v

Targets

    • Target

      Bot-Launcher.exe

    • Size

      111KB

    • MD5

      6b26d020d23abcdf1afdb9fa178023a1

    • SHA1

      d317779ac4ecc99cff0355bea2a27f8548611908

    • SHA256

      16d7446eb4de11842219292ee940933356638595d8a51b793a26257cc614c04b

    • SHA512

      91164b3571c1e39d11dc663b6c314ede43e9c62f296dbc4c5521e6372c6099505e8d7a15469243d2f193db0bced089599d579a2ea1b9776a1a4bbb8b1bfce112

    • SSDEEP

      1536:sJtH7E+U6+bCVdp6CBHL976xbRrQJmVcTQOagfvMzSqm6DeYCV87IUiYCNW4M:oIbC5x97amUjWGI1C

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks