General

  • Target

    15072024_1349_14072024_PO1807015 - PR-SCM-WARL-07 - RFQ-Order.rar

  • Size

    442KB

  • Sample

    240715-q433fstdjl

  • MD5

    b158c5b628ea94d3c6152f1ed30bd0b9

  • SHA1

    ab835065048b8fba535372ac07a538b02a6c8f3a

  • SHA256

    4003f6e4300d01d309b0ec4fc47a7e6d89a403ca89f549e0c16003c7805f355e

  • SHA512

    6eb5794cf52c389a9721f6bd3825191b337e6a71c6b9998224a69cd84d2364c9f4f4dadc4974cd1febb1663464e6237a691491652b5cf8bc9f50ca1fdd4ddb23

  • SSDEEP

    6144:T68J6A9hP7WygUm5KCq+ygZuinEQoCCnsOWQplhixam/f9F6sARAXCTIoBgXe:TiA9hTmgCqhcTfCnsORreCYABr

Malware Config

Extracted

Family

xworm

Version

5.0

C2

office4gold.duckdns.org:2468

185.174.102.60:2468

Mutex

SytVewvLq6b9BrPa

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      PO1807015 - PR-SCM-WARL-07 - RFQ-Order..exe

    • Size

      518KB

    • MD5

      2c79c3ae5e1cccd3bf147a596c211c8e

    • SHA1

      97d5fd0bb77fd3eea9fe044dd0156d8be92e3759

    • SHA256

      4834d023f44256c3b2d3cdc2240e1994a75d0774ee92491eb194f45bd9f7045c

    • SHA512

      b95a1193d3499c2cc7c412eae144286289b1fbccb35b5821f3d313b58a61c3d17846997489cc3c129bf023717313f7c8682832d00e6be5d355cae6c0cf66a581

    • SSDEEP

      12288:QrDDWx2PQfdqCT01PrVxzJ2c0Y7/YbpzWLVOZBI8k3:QPawMdqCsPxxpHMpyEBzk3

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks