General

  • Target

    xylex.exe

  • Size

    70KB

  • Sample

    240609-taepjscg88

  • MD5

    3b278b3c84fca4e19f616a6c45ab92e4

  • SHA1

    accce9f0e0582b0d83057dd93e502a4c9f02369f

  • SHA256

    2d66f5076e6e2fdb521ce886a78fb2c29c8fa1392ad10265e78dc033b50afc91

  • SHA512

    c6b646839f5449a038ac4ba936f99a414ba416a796ee3da64f16a420d49f5cba35d0dbf050edf9adcd10084ca2591f40baaf0b837a21a730a16f3e383b8e0acf

  • SSDEEP

    1536:m1UCeQzhyKBC+ZhxbRKveAJ6NqOCzc8YvDKga:mGGjZhxbwGACqOCzcJva

Malware Config

Extracted

Family

xworm

C2

medical-m.gl.at.ply.gg:28857

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    conhost.exe

Targets

    • Target

      xylex.exe

    • Size

      70KB

    • MD5

      3b278b3c84fca4e19f616a6c45ab92e4

    • SHA1

      accce9f0e0582b0d83057dd93e502a4c9f02369f

    • SHA256

      2d66f5076e6e2fdb521ce886a78fb2c29c8fa1392ad10265e78dc033b50afc91

    • SHA512

      c6b646839f5449a038ac4ba936f99a414ba416a796ee3da64f16a420d49f5cba35d0dbf050edf9adcd10084ca2591f40baaf0b837a21a730a16f3e383b8e0acf

    • SSDEEP

      1536:m1UCeQzhyKBC+ZhxbRKveAJ6NqOCzc8YvDKga:mGGjZhxbwGACqOCzcJva

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

4
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks