General

  • Target

    774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888

  • Size

    50KB

  • Sample

    240911-xlklqaxarp

  • MD5

    20e2bdf68c3b6acfda5735422b64cbea

  • SHA1

    181aa68712a5e2f06f136e065291f083c35f32dc

  • SHA256

    774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888

  • SHA512

    188c77234438a34673cc2b2164c180ff0b3d9f35ff2b17c704b36acb655d47a2a034632a59a3ed4945daae692316774c8a6fd53e80ffc53217c8045f7bc88b36

  • SSDEEP

    1536:Tf05a/CTjo89wFc9UR68OMuodS1EAd8IIm:Tf05a/CTD9wFc9U3OMhgEA6IIm

Malware Config

Extracted

Family

xworm

Version

5.0

C2

103.216.158.119:7000

Mutex

gjV5QKceVphN17zl

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    VLC_media.exe

aes.plain

Targets

    • Target

      774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888

    • Size

      50KB

    • MD5

      20e2bdf68c3b6acfda5735422b64cbea

    • SHA1

      181aa68712a5e2f06f136e065291f083c35f32dc

    • SHA256

      774529f26b02e6ac05bafff286f930882b7c8f10b73222b040f7d47430d2a888

    • SHA512

      188c77234438a34673cc2b2164c180ff0b3d9f35ff2b17c704b36acb655d47a2a034632a59a3ed4945daae692316774c8a6fd53e80ffc53217c8045f7bc88b36

    • SSDEEP

      1536:Tf05a/CTjo89wFc9UR68OMuodS1EAd8IIm:Tf05a/CTD9wFc9U3OMhgEA6IIm

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks