General

  • Target

    NetworkVPN.exe

  • Size

    73KB

  • Sample

    240628-nymr6sxgmc

  • MD5

    13096ebd1c9bd3477a6980126c30335b

  • SHA1

    dd1db44656edb5da37c71d3c6c2760cc93a54920

  • SHA256

    2e92b87e711d2e0c6a6338405c88ee79409082f710f4de516e17c204a5d4e2ad

  • SHA512

    a24cbc13c75f6472e9850b8669ab8d4fcef404111e36d85b7baa057b8ace9ab3c60a82c14346082278fe8e0fd7f2b2734202f5eb907e3542a2ddcdb4314d5366

  • SSDEEP

    1536:K82GiTnkhZY3KAJbdlRUXuaEqVy7wIM6aBwOFaqR6WVM:K82D6AJb3RUfXmmBwOAqhM

Malware Config

Extracted

Family

xworm

C2

time-austin.gl.at.ply.gg:48325

Attributes
  • Install_directory

    %AppData%

  • install_file

    Microsoft Network Realtime Inspection Service.exe

Targets

    • Target

      NetworkVPN.exe

    • Size

      73KB

    • MD5

      13096ebd1c9bd3477a6980126c30335b

    • SHA1

      dd1db44656edb5da37c71d3c6c2760cc93a54920

    • SHA256

      2e92b87e711d2e0c6a6338405c88ee79409082f710f4de516e17c204a5d4e2ad

    • SHA512

      a24cbc13c75f6472e9850b8669ab8d4fcef404111e36d85b7baa057b8ace9ab3c60a82c14346082278fe8e0fd7f2b2734202f5eb907e3542a2ddcdb4314d5366

    • SSDEEP

      1536:K82GiTnkhZY3KAJbdlRUXuaEqVy7wIM6aBwOFaqR6WVM:K82D6AJb3RUfXmmBwOAqhM

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks