General

  • Target

    Proverka.exe

  • Size

    61KB

  • Sample

    240606-mfpclsdh22

  • MD5

    c57723883c0cc14df39984fdc01602f8

  • SHA1

    4b3f132ed3f645941b3bf552db356a57ed938745

  • SHA256

    583fc29a0246146f01dd62d45a1310913514b190784032dd8fb85a02a7f03568

  • SHA512

    0fb662124be6ed5b521755181bc4248ddbb5d17adc9bd59170a4d90355b574aa1027df73821c068e395983eeab66ef6681af24bc9823fd00bb89c87b7f924f28

  • SSDEEP

    1536:YGtmNZtJtXlTiYxbGq+wRG36dROHvKtY:YMKtXlBxbGq6eROH2Y

Malware Config

Extracted

Family

xworm

C2

word-belize.gl.at.ply.gg:1678

Attributes
  • Install_directory

    %LocalAppData%

Targets

    • Target

      Proverka.exe

    • Size

      61KB

    • MD5

      c57723883c0cc14df39984fdc01602f8

    • SHA1

      4b3f132ed3f645941b3bf552db356a57ed938745

    • SHA256

      583fc29a0246146f01dd62d45a1310913514b190784032dd8fb85a02a7f03568

    • SHA512

      0fb662124be6ed5b521755181bc4248ddbb5d17adc9bd59170a4d90355b574aa1027df73821c068e395983eeab66ef6681af24bc9823fd00bb89c87b7f924f28

    • SSDEEP

      1536:YGtmNZtJtXlTiYxbGq+wRG36dROHvKtY:YMKtXlBxbGq6eROH2Y

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks