General

  • Target

    WizWorm v4.zip

  • Size

    37.3MB

  • Sample

    240902-xpn4bavglk

  • MD5

    ec4c4b3ce3366a6059c77c640108cd3f

  • SHA1

    8af810badf7302e582d0d9d18aa1fe8c4cb8288c

  • SHA256

    20656fdafd57e6c5a39f48939cbc5c4073d3ea8662a97ef13d26b1247302e1ae

  • SHA512

    649f7306e361b9c26f39fc150767853231c0245b54969a5c98f31260b8967f64bfe682cd69a648b2df20ccfc1d5d4b13508ab8ecc4c7c2047af2d8feefa8b990

  • SSDEEP

    786432:GJvWERE7Qu8rBDnyuEuYEyXbM462vawjvSjFi5bQy56kuHVcJT7mIwnxN07siP:G5nE7b8rBD7Eub+awjeFi5bncVkT7mIL

Malware Config

Extracted

Family

xworm

C2

uk1.localto.net:4159

Attributes
  • Install_directory

    %Temp%

  • install_file

    schtask.exe

Targets

    • Target

      Setup.bat

    • Size

      18.2MB

    • MD5

      5250a07fd2f90b5cee4b78aee015305b

    • SHA1

      f6880b911ef1df3c709ca47b19bc197014c86959

    • SHA256

      2edb7d64cdcf9445468c24d159cb4ec2316e69b31b82795a0520431d4c395e53

    • SHA512

      7fba9040b48d4bd644fd6aebbf6992afae192c8042b3a50b0fc78f194307fb4318191b75878408aeea6b5e0f8f83141ee49cc410973110093d8188f7852bef48

    • SSDEEP

      49152:9ufwwApQLWci6sSzR8hDsjxNu7bUDi1HssPlKrIixn9C5oLnybx7uti5BjgCP/XS:O

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • AgentTesla payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks