General

  • Target

    WizClient.com

  • Size

    78KB

  • Sample

    240821-xb31bathle

  • MD5

    fb34f7611ed09c5b9841de7881896e53

  • SHA1

    994187598b1ddd95ef850898d85ad3b349ed4d90

  • SHA256

    355d95ce2bf33c3d6cd42bedbd43de624885020949548cde29bb64d6e09956c7

  • SHA512

    6d941cdc23015498593c23df12a4babcd9263993741b66aa3cd8a1701bdf17f08a79913c8d484ae12fde970ab7bfd007d484811df2719083535618146bd242f7

  • SSDEEP

    1536:39/+BgfANsksFGOmmL8psip1tUdZb2hSpIi6xx8O5L9diMnoV:N/UY+sLGH0AUdZb2huM8O5zyV

Malware Config

Extracted

Family

xworm

C2

192.168.1.47:8000

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      WizClient.com

    • Size

      78KB

    • MD5

      fb34f7611ed09c5b9841de7881896e53

    • SHA1

      994187598b1ddd95ef850898d85ad3b349ed4d90

    • SHA256

      355d95ce2bf33c3d6cd42bedbd43de624885020949548cde29bb64d6e09956c7

    • SHA512

      6d941cdc23015498593c23df12a4babcd9263993741b66aa3cd8a1701bdf17f08a79913c8d484ae12fde970ab7bfd007d484811df2719083535618146bd242f7

    • SSDEEP

      1536:39/+BgfANsksFGOmmL8psip1tUdZb2hSpIi6xx8O5L9diMnoV:N/UY+sLGH0AUdZb2huM8O5zyV

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks