General

  • Target

    a272b0c9c1ef29b030408018c792c43d5f8f0b2b43142af5cb52bcfba899e4c7

  • Size

    327KB

  • Sample

    240905-pm2bvs1arr

  • MD5

    e8bcc353f4f717e0a9ec8df42c34beb4

  • SHA1

    56b5eedbe3ecc2c44a887bbd1f2d9dbb4a9ed97c

  • SHA256

    a272b0c9c1ef29b030408018c792c43d5f8f0b2b43142af5cb52bcfba899e4c7

  • SHA512

    0c6efe15d37163e96551915bef458b91c29ef79712e3d4c4b18272acaa33538af74f6515cd63be622005aded238c761010778e0af8dea4adfdec3ef7c587fd84

  • SSDEEP

    6144:n98Spzgs21x/GJqkntASwQvJzp8kRJoKXqwUHrsTB2zs+FAWKiXG/D8Sf7KVyBs:+Kgs2X/gDiVBQTB2zI6S8SW8Bs

Malware Config

Extracted

Family

xworm

Version

3.0

C2

silver-bowl.gl.at.ply.gg:29206

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      a272b0c9c1ef29b030408018c792c43d5f8f0b2b43142af5cb52bcfba899e4c7

    • Size

      327KB

    • MD5

      e8bcc353f4f717e0a9ec8df42c34beb4

    • SHA1

      56b5eedbe3ecc2c44a887bbd1f2d9dbb4a9ed97c

    • SHA256

      a272b0c9c1ef29b030408018c792c43d5f8f0b2b43142af5cb52bcfba899e4c7

    • SHA512

      0c6efe15d37163e96551915bef458b91c29ef79712e3d4c4b18272acaa33538af74f6515cd63be622005aded238c761010778e0af8dea4adfdec3ef7c587fd84

    • SSDEEP

      6144:n98Spzgs21x/GJqkntASwQvJzp8kRJoKXqwUHrsTB2zs+FAWKiXG/D8Sf7KVyBs:+Kgs2X/gDiVBQTB2zI6S8SW8Bs

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks