General

  • Target

    z2PO20240815.pdf.lnk

  • Size

    3KB

  • Sample

    240819-p5r6xavepa

  • MD5

    c4faf5e376bc049a2e22dca8f31e0382

  • SHA1

    5a4b2a74e6c948e603e71df075cdb84e37a9798c

  • SHA256

    c1ac6640bb74438f7a6c430ab4c701f7daf2117b87522f9bb4b8da6fdca1b375

  • SHA512

    ba9bec097690386b7201f78924e11e15d49de103fcd653fd96ec3eafb82a9e8ef0bb246a5b58d57a81d71ab9a30bff8cef5d7afbe703c01016b67a7bcbd98b1e

Malware Config

Extracted

Family

xworm

Version

5.0

C2

xwram1.duckdns.org:58345

Mutex

iEuKzrF7KOcf8iUC

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      z2PO20240815.pdf.lnk

    • Size

      3KB

    • MD5

      c4faf5e376bc049a2e22dca8f31e0382

    • SHA1

      5a4b2a74e6c948e603e71df075cdb84e37a9798c

    • SHA256

      c1ac6640bb74438f7a6c430ab4c701f7daf2117b87522f9bb4b8da6fdca1b375

    • SHA512

      ba9bec097690386b7201f78924e11e15d49de103fcd653fd96ec3eafb82a9e8ef0bb246a5b58d57a81d71ab9a30bff8cef5d7afbe703c01016b67a7bcbd98b1e

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks