General

  • Target

    zio.bat

  • Size

    368KB

  • Sample

    240609-wwhpfaeb33

  • MD5

    1c17a6b4138408c4d9020d5f1facb603

  • SHA1

    e907a2f443ad11e436fb22ca9890423b44c115db

  • SHA256

    5a913d75f93cab55687c50a16281a906704224448eadce3f6b0f99e6cc2dbfdb

  • SHA512

    78ba6eff9a50e003ace94e4ad7600222efea440c9d1085d4b84aad11b772017f2677584ce87df00c5c1a5794d8ec997b49906fbb4e28edb2e0ab6fb464c74463

  • SSDEEP

    6144:nswmGBrnNbDhe3hO7UH+/KJStNN2dqY/b9dsRYfsTFU8NJHTRwLYnkbP:ndxfe3M5yMr2AC7UPJzRE1bP

Malware Config

Extracted

Family

xworm

Version

5.0

C2

looking-memphis.gl.at.ply.gg:45119

Mutex

kWJg1zELhiwxHH2W

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      zio.bat

    • Size

      368KB

    • MD5

      1c17a6b4138408c4d9020d5f1facb603

    • SHA1

      e907a2f443ad11e436fb22ca9890423b44c115db

    • SHA256

      5a913d75f93cab55687c50a16281a906704224448eadce3f6b0f99e6cc2dbfdb

    • SHA512

      78ba6eff9a50e003ace94e4ad7600222efea440c9d1085d4b84aad11b772017f2677584ce87df00c5c1a5794d8ec997b49906fbb4e28edb2e0ab6fb464c74463

    • SSDEEP

      6144:nswmGBrnNbDhe3hO7UH+/KJStNN2dqY/b9dsRYfsTFU8NJHTRwLYnkbP:ndxfe3M5yMr2AC7UPJzRE1bP

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks