General
-
Target
rootkit2.exe
-
Size
92KB
-
Sample
240711-zbtgzssgml
-
MD5
5651e7a81c8fb1fd46815980400e2a5e
-
SHA1
6ac8c6c10930701bca9acc90d1c05acb679ea0fb
-
SHA256
8cfbd820492a10d05d35bdc16b2a14c1e2cfeea59a7ac580d4ab31e2d9c2f02b
-
SHA512
68f2d92610ff1ec6f9c729aac55eacd9b6770772ebdca53f911165713ea895cf3b27119f799cf48c0ab8978fef6c6d9dcd57bb149e24f660c1af1d985faacd3b
-
SSDEEP
1536:1tyN2QvLnSw2tKKKuax1F8ujwxmHTMHreiQM5CC/Oij5UEd/7Fn:10N2ELnSVK5xf5oHrxQICCmij5UEj
Static task
static1
Behavioral task
behavioral1
Sample
rootkit2.exe
Resource
win7-20240704-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:49403
quotes-suites.gl.at.ply:49403
quotes-suites.gl.at.ply.gg:49403
127.0.0.1:7016
software-orchestra.gl.at.ply.gg:7016
NRP6rH1yxlCpJJhG
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
gurcu
https://api.telegram.org/bot6627858737:AAHxdKC8nYjdelv_iw7J0fHrFBgCVb61I0U/sendMessage?chat_id=5189170483
Targets
-
-
Target
rootkit2.exe
-
Size
92KB
-
MD5
5651e7a81c8fb1fd46815980400e2a5e
-
SHA1
6ac8c6c10930701bca9acc90d1c05acb679ea0fb
-
SHA256
8cfbd820492a10d05d35bdc16b2a14c1e2cfeea59a7ac580d4ab31e2d9c2f02b
-
SHA512
68f2d92610ff1ec6f9c729aac55eacd9b6770772ebdca53f911165713ea895cf3b27119f799cf48c0ab8978fef6c6d9dcd57bb149e24f660c1af1d985faacd3b
-
SSDEEP
1536:1tyN2QvLnSw2tKKKuax1F8ujwxmHTMHreiQM5CC/Oij5UEd/7Fn:10N2ELnSVK5xf5oHrxQICCmij5UEj
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1