General

  • Target

    testingthis.exe

  • Size

    45KB

  • Sample

    240615-t7g6ya1elp

  • MD5

    063d599b1820fafc85fece1c9f1fe9e9

  • SHA1

    398151d220311f78ab059a601893ef443c52760e

  • SHA256

    b55eec7106cb6d22666966d3328188b754c838271fd40e1dc11cf1eb2566b272

  • SHA512

    84d70ceabe06e04beb6d2bfb4150e5c7040841169319e596751ebefce288fde4d2ddee8c5fa6ef86ec6549ef88c230d0b9956b4e9d02dffd23b3a7593bec6ed6

  • SSDEEP

    768:jpm7BcEKNvBcvL6VeRNL1a6ZO4PTPz+o+CKr3zQ4NuVVWgP4+zv+enbcuyD7UBwD:jpfEKNCj6VoJl9Go5K7s4Nu3t+enouyD

Malware Config

Extracted

Family

xworm

C2

location-involvement.gl.at.ply.gg:4325

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    svhost.exe

  • telegram

    https://api.telegram.org/bot7168105056:AAFuCvmRFCu4d1tQpp-hoVahbWiR2XeHgHc/sendMessage?chat_id=1992635040

Targets

    • Target

      testingthis.exe

    • Size

      45KB

    • MD5

      063d599b1820fafc85fece1c9f1fe9e9

    • SHA1

      398151d220311f78ab059a601893ef443c52760e

    • SHA256

      b55eec7106cb6d22666966d3328188b754c838271fd40e1dc11cf1eb2566b272

    • SHA512

      84d70ceabe06e04beb6d2bfb4150e5c7040841169319e596751ebefce288fde4d2ddee8c5fa6ef86ec6549ef88c230d0b9956b4e9d02dffd23b3a7593bec6ed6

    • SSDEEP

      768:jpm7BcEKNvBcvL6VeRNL1a6ZO4PTPz+o+CKr3zQ4NuVVWgP4+zv+enbcuyD7UBwD:jpfEKNCj6VoJl9Go5K7s4Nu3t+enouyD

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks