General

  • Target

    RTClauncher.exe

  • Size

    71KB

  • Sample

    240710-tswe1szdpc

  • MD5

    231165d18b206622d9a6ca5e7423ed23

  • SHA1

    eace0d60252f83a5b234193b42be21777deabf38

  • SHA256

    da97185f21d365d1ab660c38be7012f46b612f5a17c42388f1141c513f1fe1cc

  • SHA512

    544c4d79ea9ff5afab128d346e8dab14f5472e3535d86fc27fcdbdc060ebf2c1f500bc89e67a98651981a97319da62287ab920d694f23c77ca6f9f2e15037d2d

  • SSDEEP

    1536:VEpK8l/D7uHwKHNIQbTpf9UBBywe6CVP44YOoKCohN64fUX8E:KpPvuQgIQbTpf9bVP4FOoKBNhcX8E

Malware Config

Extracted

Family

xworm

C2

management-angle.gl.at.ply.gg:1309

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      RTClauncher.exe

    • Size

      71KB

    • MD5

      231165d18b206622d9a6ca5e7423ed23

    • SHA1

      eace0d60252f83a5b234193b42be21777deabf38

    • SHA256

      da97185f21d365d1ab660c38be7012f46b612f5a17c42388f1141c513f1fe1cc

    • SHA512

      544c4d79ea9ff5afab128d346e8dab14f5472e3535d86fc27fcdbdc060ebf2c1f500bc89e67a98651981a97319da62287ab920d694f23c77ca6f9f2e15037d2d

    • SSDEEP

      1536:VEpK8l/D7uHwKHNIQbTpf9UBBywe6CVP44YOoKCohN64fUX8E:KpPvuQgIQbTpf9bVP4FOoKBNhcX8E

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks