General

  • Target

    discord icon.png

  • Size

    10KB

  • Sample

    240807-2n8tjsyhne

  • MD5

    d74865e1094f5ac0a0e782875449ff66

  • SHA1

    3466cd8a13ba56833bc79aef606cb2cb2901c682

  • SHA256

    b2939df5a48f422fc9d62f270c182f07b5fd5a7a334478ea73af4fdb5eb12d3b

  • SHA512

    ac3f56552e2279dbff4101fb973e0e109dc79730050fdea3360a96c8888a634ebafb7b263303ec327dca1c1677ee2fc11d87548c30bc6ea87634d76e20fbe0b9

  • SSDEEP

    192:TbsBgjzwDr3L4MeSx5f15nbePguPVhnmsjq87R9oa3qxb6dX:TbsBgvwzTTbf15nygKVFZjq8R9oa6x2

Malware Config

Extracted

Family

xworm

Version

5.0

C2

contract-releases.gl.at.ply.gg:51273

Mutex

WAHv1iSMBPEjFJ7e

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      discord icon.png

    • Size

      10KB

    • MD5

      d74865e1094f5ac0a0e782875449ff66

    • SHA1

      3466cd8a13ba56833bc79aef606cb2cb2901c682

    • SHA256

      b2939df5a48f422fc9d62f270c182f07b5fd5a7a334478ea73af4fdb5eb12d3b

    • SHA512

      ac3f56552e2279dbff4101fb973e0e109dc79730050fdea3360a96c8888a634ebafb7b263303ec327dca1c1677ee2fc11d87548c30bc6ea87634d76e20fbe0b9

    • SSDEEP

      192:TbsBgjzwDr3L4MeSx5f15nbePguPVhnmsjq87R9oa3qxb6dX:TbsBgvwzTTbf15nygKVFZjq8R9oa6x2

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks