Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    BRATS V4.2‌‌.exe

  • Size

    9.7MB

  • Sample

    240624-bz8ptatcpc

  • MD5

    d7c805799b6b0b1a16223e4953d7d3d6

  • SHA1

    84b9208b01fbbbec5995328945ffee4205a31fcf

  • SHA256

    7bd2fa279b432eb8afc962e951ae03d9036adc8f381d315c8a846f4c5877c215

  • SHA512

    0b0e054f337064d8d0c7b2ccb03bba8f2e3e6c4ab809261747082e380cc309980c6e4e8b19095e5ef1885beb5bcf17a556c08b7ee9ec9691a05fddd1cd5c9951

  • SSDEEP

    196608:fxma6TVvueQBN7l6zrGgRYcZNWnmr2+EzXWLLYPm5ww87XUbmOVsXz/G:jzf78ZacZNW82+spwvsNXy

Malware Config

Extracted

Family

xworm

C2

dsasinject-58214.portmap.io:3389

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot7023899363:AAFEzgbfWzhyE32Lf95TKSRYEYXMd4AfMyk/sendMessage?chat_id=6354844663

Targets

    • Target

      BRATS V4.2‌‌.exe

    • Size

      9.7MB

    • MD5

      d7c805799b6b0b1a16223e4953d7d3d6

    • SHA1

      84b9208b01fbbbec5995328945ffee4205a31fcf

    • SHA256

      7bd2fa279b432eb8afc962e951ae03d9036adc8f381d315c8a846f4c5877c215

    • SHA512

      0b0e054f337064d8d0c7b2ccb03bba8f2e3e6c4ab809261747082e380cc309980c6e4e8b19095e5ef1885beb5bcf17a556c08b7ee9ec9691a05fddd1cd5c9951

    • SSDEEP

      196608:fxma6TVvueQBN7l6zrGgRYcZNWnmr2+EzXWLLYPm5ww87XUbmOVsXz/G:jzf78ZacZNW82+spwvsNXy

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks