Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad

  • Size

    79KB

  • Sample

    240612-qlft7szdrl

  • MD5

    f1e41321cd4394089842e5121d5cb649

  • SHA1

    96e3aff8a0eecda81e8d0b10323a1680b1136387

  • SHA256

    401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad

  • SHA512

    243adaeca82d89fa982c839c0b730b26e32a228d8e493edb04508f416b262334263c435fead1bffa3ad54a2b574e99cae2fa82d13d2d0c3dbca28c5184f4c9e3

  • SSDEEP

    1536:IU8SlJ3N8bspa09DfVtHbRZuBDXcCK68u2yOeYdXGnE1B:cSlJrDHbRZMDXUmO9Wn6B

Malware Config

Extracted

Family

xworm

C2

listing-trackbacks.gl.at.ply.gg:8848

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad

    • Size

      79KB

    • MD5

      f1e41321cd4394089842e5121d5cb649

    • SHA1

      96e3aff8a0eecda81e8d0b10323a1680b1136387

    • SHA256

      401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad

    • SHA512

      243adaeca82d89fa982c839c0b730b26e32a228d8e493edb04508f416b262334263c435fead1bffa3ad54a2b574e99cae2fa82d13d2d0c3dbca28c5184f4c9e3

    • SSDEEP

      1536:IU8SlJ3N8bspa09DfVtHbRZuBDXcCK68u2yOeYdXGnE1B:cSlJrDHbRZMDXUmO9Wn6B

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks