General

  • Target

    9a18962acee9b5b7946b1425233581e0N.exe

  • Size

    85KB

  • Sample

    240823-qgzrhsyclm

  • MD5

    9a18962acee9b5b7946b1425233581e0

  • SHA1

    4f969b78f34af14278f8e422aacc26d203e5d427

  • SHA256

    f89ebc619ed93a97968f38959d4582b331b94aa748fd1123fc8276d805164a43

  • SHA512

    f574af01cdf46b382e9708a9b16fc8852b2d0e3689d07683f7dc552f14f1e072cc4ae4134747e301dec31a5381b344058c74f5fbcd1fe917623fbb60243527cf

  • SSDEEP

    1536:4mYiwWSj+jM1zw03EQ9+bqADgpnGQFKS416+O2GrkjQIzuvdS1EAd8IIU:4mjjfUj+bqADUhFDAO9AjQa4gEA6IIU

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

149.22.84.163:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Vlc.exe

  • telegram

    https://api.telegram.org/bot7319980603:AAFuzygI8cI8IS2VJgdLb0HfT3zr-_0GWFU

Targets

    • Target

      9a18962acee9b5b7946b1425233581e0N.exe

    • Size

      85KB

    • MD5

      9a18962acee9b5b7946b1425233581e0

    • SHA1

      4f969b78f34af14278f8e422aacc26d203e5d427

    • SHA256

      f89ebc619ed93a97968f38959d4582b331b94aa748fd1123fc8276d805164a43

    • SHA512

      f574af01cdf46b382e9708a9b16fc8852b2d0e3689d07683f7dc552f14f1e072cc4ae4134747e301dec31a5381b344058c74f5fbcd1fe917623fbb60243527cf

    • SSDEEP

      1536:4mYiwWSj+jM1zw03EQ9+bqADgpnGQFKS416+O2GrkjQIzuvdS1EAd8IIU:4mjjfUj+bqADUhFDAO9AjQa4gEA6IIU

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks