General

  • Target

    Cracked.exe

  • Size

    38KB

  • Sample

    240813-2t2bnazhma

  • MD5

    9d10ff9730ba670afbb97dff9007848d

  • SHA1

    5b41d78352d51f364f05f2e5885171bcb5e9a80d

  • SHA256

    340381540ff9d1688c2a7f40f89c5bdbdb83f93b5a0a9c4ef71964d7663463ac

  • SHA512

    5211ea93a8ed668f8b6318901c8f68a44ed54dafef23e13f9adb599f7cc0b33fc54ba9cc56f1c13a929d193bd6e9c5ea5a66292dd6c8d4f5d98fc6671d7427cd

  • SSDEEP

    768:1LhOEwjbrttFxUFNNix4i8YRRoNbTepFj9jakIF6SOMh5nLky:1Fybrwf2fRoNbTqFj9+kIF6SOM/Lh

Malware Config

Extracted

Family

xworm

Version

5.0

C2

4.tcp.eu.ngrok.io:11086

Mutex

RvSdVUUiIlksqLuo

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Cracked.exe

    • Size

      38KB

    • MD5

      9d10ff9730ba670afbb97dff9007848d

    • SHA1

      5b41d78352d51f364f05f2e5885171bcb5e9a80d

    • SHA256

      340381540ff9d1688c2a7f40f89c5bdbdb83f93b5a0a9c4ef71964d7663463ac

    • SHA512

      5211ea93a8ed668f8b6318901c8f68a44ed54dafef23e13f9adb599f7cc0b33fc54ba9cc56f1c13a929d193bd6e9c5ea5a66292dd6c8d4f5d98fc6671d7427cd

    • SSDEEP

      768:1LhOEwjbrttFxUFNNix4i8YRRoNbTepFj9jakIF6SOMh5nLky:1Fybrwf2fRoNbTqFj9+kIF6SOM/Lh

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks