General

  • Target

    xworm v5.6.rar

  • Size

    23.2MB

  • Sample

    240821-jp4l4s1cpr

  • MD5

    12613a4c5445f137acff23cb020311c7

  • SHA1

    88a1cf43fd5159b5171ed7e76607be0fb49336fa

  • SHA256

    3a5e81d324db316d732da47ab518739928ea4890fddff8b386ababf168719eaa

  • SHA512

    47aaa3025e101d940c0e7994c0377ffd24aadd871ab9a6e7b3f5ada401eb3690e60a48c14c000d56b0051cf61112d400c5534fae17053e29dd7baf1f66eb9b42

  • SSDEEP

    393216:LyaE/i+e39n3bQr3vuO8kv9e6JIatKidc/fApwx8Ls3A4eTo6OqwDyEWNhTP6tGg:Lyt+3hw/d/iatbdcHApOFmo6OJuNNQtH

Malware Config

Extracted

Family

xworm

C2

might-gdp.gl.at.ply.gg:58764

capacity-rise.gl.at.ply.gg:36727

Attributes
  • install_file

    USB.exe

Targets

    • Target

      Xworm 5.6/Xworm V5.6.exe

    • Size

      7.8MB

    • MD5

      c271db9b847221076506fd6b80d27e70

    • SHA1

      97949415366b41d720fc787fec8d79caed7b7167

    • SHA256

      b33c17ec8a56e93f0c936197fe1b5c79c6db69bd002a89e739bd52871c9ebef1

    • SHA512

      63e96f38074d6f81ee937e10caf49cb56c2f443dabc8c8ad10542c1e93e26be52a80d7f77761f42ad087d2c711d1f1e72bc467e6724f8256a602434767e6d6d1

    • SSDEEP

      196608:cmKLCFU/jHq/puROyhxeyOC7+oiRkbtejBe5d:cmmq/pkOYxehohbtN

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks