General

  • Target

    TrinityV2.exe

  • Size

    516KB

  • Sample

    240608-mxb4lsah8x

  • MD5

    78b76867f6fc4770ed720616230292ba

  • SHA1

    a6e2cdae0dc8f8ad070ee1b28337036a457e45a2

  • SHA256

    97f2e56dc51fe8d315b213597e35d5b2f5cbeb8d71c6adfe7a0b9d28c3c9dac9

  • SHA512

    99ccd96909f3f31d6fd06150f206c72be4d33389b3f6786c2ae3869d0e9eb19a031522b9220fb3651e283d30afd930d79acb9d68b1f21e2860e5f0859a4aa55c

  • SSDEEP

    1536:UBLUVVU+Gwi0VzRDWcQjK1/41D0jv0VzRDWcQjK1/41D0jrCtVcl:VrDFJ41D0jMrDFJ41D0jrC/Y

Malware Config

Extracted

Family

xworm

Version

5.0

C2

19.ip.gl.ply.gg:32712

Mutex

Pzty25hnZjK5ZOPd

Attributes
  • Install_directory

    %AppData%

  • install_file

    Users.exe

aes.plain

Targets

    • Target

      TrinityV2.exe

    • Size

      516KB

    • MD5

      78b76867f6fc4770ed720616230292ba

    • SHA1

      a6e2cdae0dc8f8ad070ee1b28337036a457e45a2

    • SHA256

      97f2e56dc51fe8d315b213597e35d5b2f5cbeb8d71c6adfe7a0b9d28c3c9dac9

    • SHA512

      99ccd96909f3f31d6fd06150f206c72be4d33389b3f6786c2ae3869d0e9eb19a031522b9220fb3651e283d30afd930d79acb9d68b1f21e2860e5f0859a4aa55c

    • SSDEEP

      1536:UBLUVVU+Gwi0VzRDWcQjK1/41D0jv0VzRDWcQjK1/41D0jrCtVcl:VrDFJ41D0jMrDFJ41D0jrC/Y

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks