General

  • Target

    XWorm-V3.1-main.zip

  • Size

    35.0MB

  • Sample

    240907-nk1f4ssajp

  • MD5

    d7907542c90fc162306ded4f7503a2c4

  • SHA1

    3436c39c3de23fea5cb7ef4403c56a140bdd4cdb

  • SHA256

    ab8c5188ad40614d30e6306e31a79224ff62c8b110ebce9f8d438e7476948977

  • SHA512

    a913aaf09bd7fa56097cdd57b1be760ee0b92908453556399c52cba4c68bbb26248a074828780d162b1082edad53284bb474f2abcabf32c9d317a3ffc028ce55

  • SSDEEP

    786432:fjiDNnx2+WNY0bAgRuIr38/aUZc+VnGajZAS//p643fU74mB48zN4Elrly5tV3Lz:7iDNnxVWi0bAgAo8/aang000fY458yE8

Malware Config

Extracted

Family

xworm

Version

3.0

C2

18.ip.gl.ply.gg:35094

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      XWorm-V3.1-main/XWorm V3.1.exe

    • Size

      13.5MB

    • MD5

      32dcf4cd512da44a9d2a66f167da02e7

    • SHA1

      4224b58657428bb6edb85c73be85a9bcffb46c09

    • SHA256

      0d51c076489c1f892c81460633b8780dbf257ae2f3798d727a138d741ac132f2

    • SHA512

      6e0b843930ac48adad31f95e45fc2252bb0194b202be5d995b98b6ef926427e33e8b7be5ecf7615440ec314a4971a007ccf1c08b083ebae1217dbbc135320069

    • SSDEEP

      393216:myjEZpRN3b67r3f4/fxU8IWUIURsLBHiEZhQfbx7P5kvxT:zEZp+3Q/JU8b5YIBHNCfF7P5kv1

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks