General

  • Target

    hdgskhajdas.exe

  • Size

    76KB

  • Sample

    240811-1cq9patcmd

  • MD5

    aa8bcf0e83ab2a2af7ce39875fd20fbe

  • SHA1

    c55ad41b192f90ca53a42ecf04db5765313ac87d

  • SHA256

    83987f4b73cdd5039147a00ee7340b05edf3d672d07e848085ec29a328173585

  • SHA512

    9dc8b2958fb7fb42a7843ad4d1a7a9c08f3e17f12c1b44ffb3b2a2a07d49d8389cbcc3ff3bbd6a52c95d4856e1721c66ceffc2ca22473f373ff070cc21ed6700

  • SSDEEP

    1536:Fi2fm7411REAwgc2/HbYftO9Y7bIKkYY+qdko76b+O1NdP0hX:DE/J6y7bIKk1Pdkp+OTdY

Malware Config

Extracted

Family

xworm

C2

147.185.221.21:4825

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    EpicGamesLauncher.exe

Targets

    • Target

      hdgskhajdas.exe

    • Size

      76KB

    • MD5

      aa8bcf0e83ab2a2af7ce39875fd20fbe

    • SHA1

      c55ad41b192f90ca53a42ecf04db5765313ac87d

    • SHA256

      83987f4b73cdd5039147a00ee7340b05edf3d672d07e848085ec29a328173585

    • SHA512

      9dc8b2958fb7fb42a7843ad4d1a7a9c08f3e17f12c1b44ffb3b2a2a07d49d8389cbcc3ff3bbd6a52c95d4856e1721c66ceffc2ca22473f373ff070cc21ed6700

    • SSDEEP

      1536:Fi2fm7411REAwgc2/HbYftO9Y7bIKkYY+qdko76b+O1NdP0hX:DE/J6y7bIKk1Pdkp+OTdY

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.