General

  • Target

    svchost.exe

  • Size

    45KB

  • Sample

    240608-v4lwdsdh3t

  • MD5

    eb83e5875b331ecdf33090ea48621c8a

  • SHA1

    45a855c317e8373cd955df8dd48b60f11b6d0869

  • SHA256

    7a1af5a32471faac266e840be96ccce6afd1d1763554d409d59fdf4c453d407f

  • SHA512

    bf169387a9610b6a57d6fe006b6526a9a50a9a5e993236418df9bf1ca5da44e069aef7769c354965be948affeecec2d594f08a75dddaebb532458fed0da8a4ad

  • SSDEEP

    768:VyK0gdhOEykDe9Y/gx4T9nEcNc1hlVvD4xeVhKfkvLbFEPa9pvG6iOChSzjif4M:VyKrAkDeO1Ra/lZrOM/FJ9NG6iOCMegM

Malware Config

Extracted

Family

xworm

Version

5.0

C2

pa-nitrogen.gl.at.ply.gg:62957

Mutex

uBSYttj1y6tsldI6

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

aes.plain

Targets

    • Target

      svchost.exe

    • Size

      45KB

    • MD5

      eb83e5875b331ecdf33090ea48621c8a

    • SHA1

      45a855c317e8373cd955df8dd48b60f11b6d0869

    • SHA256

      7a1af5a32471faac266e840be96ccce6afd1d1763554d409d59fdf4c453d407f

    • SHA512

      bf169387a9610b6a57d6fe006b6526a9a50a9a5e993236418df9bf1ca5da44e069aef7769c354965be948affeecec2d594f08a75dddaebb532458fed0da8a4ad

    • SSDEEP

      768:VyK0gdhOEykDe9Y/gx4T9nEcNc1hlVvD4xeVhKfkvLbFEPa9pvG6iOChSzjif4M:VyKrAkDeO1Ra/lZrOM/FJ9NG6iOCMegM

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks