General

  • Target

    https://cdn.discordapp.com/attachments/1241761661421883473/1251271497541091349/main.v1.exe?ex=666df8e4&is=666ca764&hm=9cd7d38f484c2133d8efbb50ddb02a9f24280d9102173df52a8573a75d479e85&

  • Sample

    240614-y8jhlsycnk

Malware Config

Extracted

Family

xworm

C2

gift-scientists.gl.at.ply.gg:20443

Attributes
  • Install_directory

    %AppData%

  • install_file

    scvhost.exe

Targets

    • Target

      https://cdn.discordapp.com/attachments/1241761661421883473/1251271497541091349/main.v1.exe?ex=666df8e4&is=666ca764&hm=9cd7d38f484c2133d8efbb50ddb02a9f24280d9102173df52a8573a75d479e85&

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks