General

  • Target

    WindInj.exe

  • Size

    1.6MB

  • Sample

    240816-y4yfzayclj

  • MD5

    06db1e78e3323041cf6bfe1fac9dc3c4

  • SHA1

    9ecb64848d153def97639a366f37f231bd75f23b

  • SHA256

    56063292163f08991a7021b123a25867cdeaee6998779c59eecf7cef918b680a

  • SHA512

    c92886feb1f1730bcdc4952d8849e797f7f891e3136998521048c36362f52ae62b5b70ca521c65d1800e06c2486f9ae7540730c90e876b3323ac6d58d1cebd25

  • SSDEEP

    49152:XRIjDjlabwz9y4VNQ1BH1G8s3jOZNhaX9P/hNftsEd57wBNcIFZ:aqwU4VN0BQ8s3jOZNcZZ3d57CciZ

Malware Config

Extracted

Family

xworm

C2

192.168.1.199:7000

192.168.1.1:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      WindInj.exe

    • Size

      1.6MB

    • MD5

      06db1e78e3323041cf6bfe1fac9dc3c4

    • SHA1

      9ecb64848d153def97639a366f37f231bd75f23b

    • SHA256

      56063292163f08991a7021b123a25867cdeaee6998779c59eecf7cef918b680a

    • SHA512

      c92886feb1f1730bcdc4952d8849e797f7f891e3136998521048c36362f52ae62b5b70ca521c65d1800e06c2486f9ae7540730c90e876b3323ac6d58d1cebd25

    • SSDEEP

      49152:XRIjDjlabwz9y4VNQ1BH1G8s3jOZNhaX9P/hNftsEd57wBNcIFZ:aqwU4VN0BQ8s3jOZNcZZ3d57CciZ

    • Detect Xworm Payload

    • Modifies visiblity of hidden/system files in Explorer

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks