General

  • Target

    nTalu.lnk

  • Size

    2KB

  • Sample

    240731-jh4crsycnb

  • MD5

    79b6a1c72f61bf2358eca72f4d67b4d7

  • SHA1

    22c3540ce90d11b32b0a9c2eae94ae467af2aabf

  • SHA256

    ee3dad6434cb64d091d15fda5900d088f46b64d0603a449d6bd46afb9705140a

  • SHA512

    839fb585a20812324f4058cb2e354be77b243c212fcf35e1c16fb2668a266cbeb784844512e0aa15e6077cf2570e88b04bb986164f4972e1bc63a61576967d6e

Malware Config

Extracted

Family

xworm

Version

5.0

C2

lisa22194141.duckdns.org:7000

Mutex

2tuao2989c3EVwzo

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      nTalu.lnk

    • Size

      2KB

    • MD5

      79b6a1c72f61bf2358eca72f4d67b4d7

    • SHA1

      22c3540ce90d11b32b0a9c2eae94ae467af2aabf

    • SHA256

      ee3dad6434cb64d091d15fda5900d088f46b64d0603a449d6bd46afb9705140a

    • SHA512

      839fb585a20812324f4058cb2e354be77b243c212fcf35e1c16fb2668a266cbeb784844512e0aa15e6077cf2570e88b04bb986164f4972e1bc63a61576967d6e

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks