General

  • Target

    python-3.11.4-amd64.exe

  • Size

    24.4MB

  • Sample

    240614-qkm7wswcpq

  • MD5

    db01da32497827ffdab98892bfd3df2c

  • SHA1

    90abeb27f622efc116153c0a1b85e963413fecb1

  • SHA256

    a5988b3ae8424c1f5fdc69bb76d38782f2bd152fad311246aef971bfb389b8a3

  • SHA512

    034e7962ba907106366ca9dc71fa3de0b30343ddf5624a3c79a9ef473e0918644c12b0281f22ea01eb03b666c35f949058b3e9c096407a9fc767eb87507b316a

  • SSDEEP

    393216:xTlYj50Uhf9kifhb5g5W7eCH29UKPNIy7fq2/k6ioE0pdGSLcjlP:xlYV0AfW8hCYzHjKFIy7fq2M6ikox

Malware Config

Extracted

Family

xworm

C2

location-involvement.gl.at.ply.gg:4325

<Xwormmm>:4325

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    svhost.exe

  • telegram

    https://api.telegram.org/bot7168105056:AAFuCvmRFCu4d1tQpp-hoVahbWiR2XeHgHc/sendMessage?chat_id=1992635040

Targets

    • Target

      python-3.11.4-amd64.exe

    • Size

      24.4MB

    • MD5

      db01da32497827ffdab98892bfd3df2c

    • SHA1

      90abeb27f622efc116153c0a1b85e963413fecb1

    • SHA256

      a5988b3ae8424c1f5fdc69bb76d38782f2bd152fad311246aef971bfb389b8a3

    • SHA512

      034e7962ba907106366ca9dc71fa3de0b30343ddf5624a3c79a9ef473e0918644c12b0281f22ea01eb03b666c35f949058b3e9c096407a9fc767eb87507b316a

    • SSDEEP

      393216:xTlYj50Uhf9kifhb5g5W7eCH29UKPNIy7fq2/k6ioE0pdGSLcjlP:xlYV0AfW8hCYzHjKFIy7fq2M6ikox

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks