General

  • Target

    NursultanLauncher.exe

  • Size

    14.6MB

  • Sample

    240722-xzdekatfkl

  • MD5

    e0931ba21d8e656b82511a8686e0026f

  • SHA1

    432225926aa4f5841cfd035a51ff7157a5a8809a

  • SHA256

    9c5df26ea92875cc1fa22046f5b88a881b09d9dca85ac65a10e29ee1dc9b1bf5

  • SHA512

    6aa7fc36e38ba34ef039ba4df38f239e416070d76f300f4043015139da5ed827c92d32862b0c75d540c4194a2785c6ac524e554d1580f1a4e93aa4a61b6718c0

  • SSDEEP

    393216:7pRpu51k22qim6QTV6hTZLPHZ3a88WAgSgHD:7pR12j/R4b5iWAgHD

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:57645

20.ip.gl.ply.gg:57645

Attributes
  • Install_directory

    %AppData%

  • install_file

    Tlauncher.exe

Targets

    • Target

      NursultanLauncher.exe

    • Size

      14.6MB

    • MD5

      e0931ba21d8e656b82511a8686e0026f

    • SHA1

      432225926aa4f5841cfd035a51ff7157a5a8809a

    • SHA256

      9c5df26ea92875cc1fa22046f5b88a881b09d9dca85ac65a10e29ee1dc9b1bf5

    • SHA512

      6aa7fc36e38ba34ef039ba4df38f239e416070d76f300f4043015139da5ed827c92d32862b0c75d540c4194a2785c6ac524e554d1580f1a4e93aa4a61b6718c0

    • SSDEEP

      393216:7pRpu51k22qim6QTV6hTZLPHZ3a88WAgSgHD:7pR12j/R4b5iWAgHD

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks