General

  • Target

    2862431a58c6d05311734d24fdd812e19bf01c0cdc50fb549347e461713a3449.exe

  • Size

    40KB

  • Sample

    240830-bmtp5a1hlm

  • MD5

    36a1ae0555b5c56da0d72fc78864f11e

  • SHA1

    516159937190a889e2cfa1f4b3a2d4a0a772f82f

  • SHA256

    2862431a58c6d05311734d24fdd812e19bf01c0cdc50fb549347e461713a3449

  • SHA512

    3313c7303e745de06a0cc0b1093f251f82bffd88fea7d37403449924a0d7c8a844d9d73ace749022b60cf3932c3da121c3a6836f62347942d622d5a3af3f6cea

  • SSDEEP

    768:INfPMSk3K/EzTb/0X8WuFZ4ZJF5PC9O9568OMhu3/O2:of05a/CTjS89wFc9U568OMsF

Malware Config

Extracted

Family

xworm

Version

5.0

C2

156.225.129.219:1445

Mutex

LkRlKJxmQjSvDYPt

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      2862431a58c6d05311734d24fdd812e19bf01c0cdc50fb549347e461713a3449.exe

    • Size

      40KB

    • MD5

      36a1ae0555b5c56da0d72fc78864f11e

    • SHA1

      516159937190a889e2cfa1f4b3a2d4a0a772f82f

    • SHA256

      2862431a58c6d05311734d24fdd812e19bf01c0cdc50fb549347e461713a3449

    • SHA512

      3313c7303e745de06a0cc0b1093f251f82bffd88fea7d37403449924a0d7c8a844d9d73ace749022b60cf3932c3da121c3a6836f62347942d622d5a3af3f6cea

    • SSDEEP

      768:INfPMSk3K/EzTb/0X8WuFZ4ZJF5PC9O9568OMhu3/O2:of05a/CTjS89wFc9U568OMsF

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks