General

  • Target

    Nkomssgp.exe

  • Size

    4.6MB

  • Sample

    240615-fxy5tatdlr

  • MD5

    1d6421617b9bdaccaa87db2edc96cda0

  • SHA1

    002eb8b01151aebe91d8a8f8d4ed52c3aad9e1b2

  • SHA256

    a25bff1c3254fa942a830abd32bd1953e282a321a94ab9fc22e25f66d5f4b1a2

  • SHA512

    80f991929992adeda30d8137bf59c435671548f4580dac3e1c6df7c129c5d554711365a3b375cff8568345f554f971026ea60785931deeb8baacd6c643e92104

  • SSDEEP

    24576:w5VeFILu7XJJbYzr8KNJWtOh6S9JD4E678avKanuEXLI16NqX6QZkUHHsOS8dK/Z:4Vw

Malware Config

Targets

    • Target

      Nkomssgp.exe

    • Size

      4.6MB

    • MD5

      1d6421617b9bdaccaa87db2edc96cda0

    • SHA1

      002eb8b01151aebe91d8a8f8d4ed52c3aad9e1b2

    • SHA256

      a25bff1c3254fa942a830abd32bd1953e282a321a94ab9fc22e25f66d5f4b1a2

    • SHA512

      80f991929992adeda30d8137bf59c435671548f4580dac3e1c6df7c129c5d554711365a3b375cff8568345f554f971026ea60785931deeb8baacd6c643e92104

    • SSDEEP

      24576:w5VeFILu7XJJbYzr8KNJWtOh6S9JD4E678avKanuEXLI16NqX6QZkUHHsOS8dK/Z:4Vw

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks