General

  • Target

    cf7a4925fdb1f1add01d039751d168ecf9fc958efe3b926c14566d207de4b6b4.exe

  • Size

    5.6MB

  • Sample

    240727-cdxwvszcrn

  • MD5

    578b2c56cabfa2d2a29bc7c0184a8e1d

  • SHA1

    11326b4b732c5cdb0edf9541c70d2dea3411ad6f

  • SHA256

    cf7a4925fdb1f1add01d039751d168ecf9fc958efe3b926c14566d207de4b6b4

  • SHA512

    7ef67f3e50ad6bfb49b4fe62c7b44982d9b1620627c6514c535fb7df5c56aceb16a0392d7c9af82016d42a809ea2475eb1c4595bf87cedb3657a73d0fa6b57d8

  • SSDEEP

    98304:AxdENT+6HE4ThcGalSS9d+udj3mYcCqQcgT3XV8tEbETvsDHaLqV710ZZ9rPzrPH:v/HMlS2JxmYcmcg7XGqb6Msq51GPf

Malware Config

Extracted

Family

xworm

C2

she-vocal.gl.at.ply.gg:36704

Attributes
  • Install_directory

    %AppData%

  • install_file

    notepad.exe

Targets

    • Target

      cf7a4925fdb1f1add01d039751d168ecf9fc958efe3b926c14566d207de4b6b4.exe

    • Size

      5.6MB

    • MD5

      578b2c56cabfa2d2a29bc7c0184a8e1d

    • SHA1

      11326b4b732c5cdb0edf9541c70d2dea3411ad6f

    • SHA256

      cf7a4925fdb1f1add01d039751d168ecf9fc958efe3b926c14566d207de4b6b4

    • SHA512

      7ef67f3e50ad6bfb49b4fe62c7b44982d9b1620627c6514c535fb7df5c56aceb16a0392d7c9af82016d42a809ea2475eb1c4595bf87cedb3657a73d0fa6b57d8

    • SSDEEP

      98304:AxdENT+6HE4ThcGalSS9d+udj3mYcCqQcgT3XV8tEbETvsDHaLqV710ZZ9rPzrPH:v/HMlS2JxmYcmcg7XGqb6Msq51GPf

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks