General

  • Target

    New folder (4).rar

  • Size

    58.1MB

  • Sample

    240609-sbm7mscd75

  • MD5

    f2bfcce24b2fa14dd826f027801e3267

  • SHA1

    e88fd128bb8fae48414aeaeec02dd554333773f5

  • SHA256

    8670668e7b410f649ae2615b353d0fe3921fb29a1f6c74e9889965340265ea15

  • SHA512

    bd6c70b933cd60da346b3d09ca5d0bce4a40c8e5b25b528b00c4487fa3692421e58ae5a43408d475ef776e860ed30f974d190705e2dd3f52260a083c33abe34a

  • SSDEEP

    1572864:C/llFf9XqgGhy0n4pOSXeJCqCiTqsWz753gh:kbf9GA6wOSOhCiT6zdU

Malware Config

Extracted

Family

xworm

C2

91.92.241.69:5555

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Windows Runtime.exe

Targets

    • Target

      New folder (4).rar

    • Size

      58.1MB

    • MD5

      f2bfcce24b2fa14dd826f027801e3267

    • SHA1

      e88fd128bb8fae48414aeaeec02dd554333773f5

    • SHA256

      8670668e7b410f649ae2615b353d0fe3921fb29a1f6c74e9889965340265ea15

    • SHA512

      bd6c70b933cd60da346b3d09ca5d0bce4a40c8e5b25b528b00c4487fa3692421e58ae5a43408d475ef776e860ed30f974d190705e2dd3f52260a083c33abe34a

    • SSDEEP

      1572864:C/llFf9XqgGhy0n4pOSXeJCqCiTqsWz753gh:kbf9GA6wOSOhCiT6zdU

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Tasks