General

  • Target

    detectedware-slotted.exe

  • Size

    322KB

  • Sample

    240615-a4ervswhpn

  • MD5

    459dd7b5c067e49c7b5f4dfc71c24492

  • SHA1

    dfcca50e0a2e13d45dee3795198512e67fc7d978

  • SHA256

    a5ec222a5db821e8f9e570d8fc0ea2ea56d73b508bf1c85a6a96768822673da2

  • SHA512

    a174276dd5c22459aeeb58ae679cded2e5aabc6127c30581e064c93a603ddbc6115f1a3eee91cc735c5aec8d4e7241ddd5f8261eafce3f93795e39c8fec2e782

  • SSDEEP

    6144:/tT9AysXQRszb1L/a9oOfruOOAPwrnekZSr:/tTeyA31LqpfruTVrnet

Malware Config

Extracted

Family

xworm

Version

5.0

C2

147.185.221.16:56793

Mutex

mAP85CEDpXrrCljV

Attributes
  • Install_directory

    %AppData%

  • install_file

    Update.exe

aes.plain

Targets

    • Target

      detectedware-slotted.exe

    • Size

      322KB

    • MD5

      459dd7b5c067e49c7b5f4dfc71c24492

    • SHA1

      dfcca50e0a2e13d45dee3795198512e67fc7d978

    • SHA256

      a5ec222a5db821e8f9e570d8fc0ea2ea56d73b508bf1c85a6a96768822673da2

    • SHA512

      a174276dd5c22459aeeb58ae679cded2e5aabc6127c30581e064c93a603ddbc6115f1a3eee91cc735c5aec8d4e7241ddd5f8261eafce3f93795e39c8fec2e782

    • SSDEEP

      6144:/tT9AysXQRszb1L/a9oOfruOOAPwrnekZSr:/tTeyA31LqpfruTVrnet

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks