General

  • Target

    EaglesBC.exe

  • Size

    8.1MB

  • Sample

    240814-rxelysscrk

  • MD5

    6db2ccfd83e9719a3a328362e8fe0247

  • SHA1

    01e99e55c4a89274a0f6bbaaf9a32bab7db5f652

  • SHA256

    66fcc6ec0e395dda3758e85486fc5a405d3c67e5f659ba1b5cdf9954450973d2

  • SHA512

    c9df7dddadc8a4d89b00a2f47d8bd2e01c5d52e2b65112cc2fc7b4f12e0998ad2fb3b5641bfca28dc6cd859cc3db21c8ee97c7f11cadfd387d752b2bdf4ba001

  • SSDEEP

    196608:JmWjRSUnMjo1wlLYpWnpSQNMev7GwwgUXhE:3jRrnTw9JnQ706X

Malware Config

Extracted

Family

xworm

C2

church-insight.gl.at.ply.gg:54667

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    ntoskrnl.exe

Targets

    • Target

      EaglesBC.exe

    • Size

      8.1MB

    • MD5

      6db2ccfd83e9719a3a328362e8fe0247

    • SHA1

      01e99e55c4a89274a0f6bbaaf9a32bab7db5f652

    • SHA256

      66fcc6ec0e395dda3758e85486fc5a405d3c67e5f659ba1b5cdf9954450973d2

    • SHA512

      c9df7dddadc8a4d89b00a2f47d8bd2e01c5d52e2b65112cc2fc7b4f12e0998ad2fb3b5641bfca28dc6cd859cc3db21c8ee97c7f11cadfd387d752b2bdf4ba001

    • SSDEEP

      196608:JmWjRSUnMjo1wlLYpWnpSQNMev7GwwgUXhE:3jRrnTw9JnQ706X

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks