General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe

  • Size

    551KB

  • Sample

    240710-ak16rawfrc

  • MD5

    e30e2fe91be631b7bb50916d7b521c29

  • SHA1

    7174d5827f6a97e102ed84dc4083a535eb101dc3

  • SHA256

    5251566d0b8a27c5399efb9e5298c1c50fda246e3f15c8ebccf7d21282edede3

  • SHA512

    9ebe8208832e63efce3c0d8e158695e2b308852dfa07525b74b38a29ee1245f035395b8e17e2a5f4c4afbb6d39cadd619425ed9e67f1348aa01a1e89c83afece

  • SSDEEP

    12288:/B7jZhysUp6eR1QBNHDt11EpWrcKIx6AB/PX6BPLAzibNv0dY:/xZETp6eoNHDt1mmbroPX6BLoihv0C

Malware Config

Extracted

Family

xworm

Version

3.1

C2

rwanco.duckdns.org:1515

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      SecuriteInfo.com.Win32.PWSX-gen.24441.7577.exe

    • Size

      551KB

    • MD5

      e30e2fe91be631b7bb50916d7b521c29

    • SHA1

      7174d5827f6a97e102ed84dc4083a535eb101dc3

    • SHA256

      5251566d0b8a27c5399efb9e5298c1c50fda246e3f15c8ebccf7d21282edede3

    • SHA512

      9ebe8208832e63efce3c0d8e158695e2b308852dfa07525b74b38a29ee1245f035395b8e17e2a5f4c4afbb6d39cadd619425ed9e67f1348aa01a1e89c83afece

    • SSDEEP

      12288:/B7jZhysUp6eR1QBNHDt11EpWrcKIx6AB/PX6BPLAzibNv0dY:/xZETp6eoNHDt1mmbroPX6BLoihv0C

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks