Resubmissions

28-06-2024 23:46

240628-3sddwavhjc 10

28-06-2024 14:25

240628-rrsavsthne 10

General

  • Target

    RunTimeBroker.exe

  • Size

    39KB

  • Sample

    240628-3sddwavhjc

  • MD5

    0061dd18de7cfdd840fbce10433e8d73

  • SHA1

    9852fe23c191a11a387a7f7a7744c15b1d7d601a

  • SHA256

    06ebe0fa2a8df8fe5a51879b6e4a81292bd36668e619666f94db94641666abd9

  • SHA512

    4687b8357ef603dfbefd0661d103a454d7d1dc3448526d6e9d21823a2d60b485cea307eedf846dd695bc2009534abd1081461d03f39729dc9c642478a6d87411

  • SSDEEP

    768:N2CSKPu9Wkh6A9C96eutXwwTSmvAFU9OLj6SOMhNL575A:EVK6WgMs2moFU9Yj6SOM/pi

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

rTw9cIeh9w3su4g8

Attributes
  • Install_directory

    %AppData%

  • install_file

    Dllhost.exe

  • pastebin_url

    https://pastebin.com/raw/pw1j2xqz

aes.plain

Targets

    • Target

      RunTimeBroker.exe

    • Size

      39KB

    • MD5

      0061dd18de7cfdd840fbce10433e8d73

    • SHA1

      9852fe23c191a11a387a7f7a7744c15b1d7d601a

    • SHA256

      06ebe0fa2a8df8fe5a51879b6e4a81292bd36668e619666f94db94641666abd9

    • SHA512

      4687b8357ef603dfbefd0661d103a454d7d1dc3448526d6e9d21823a2d60b485cea307eedf846dd695bc2009534abd1081461d03f39729dc9c642478a6d87411

    • SSDEEP

      768:N2CSKPu9Wkh6A9C96eutXwwTSmvAFU9OLj6SOMhNL575A:EVK6WgMs2moFU9Yj6SOM/pi

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks