General

  • Target

    TDpremium.exe

  • Size

    74KB

  • Sample

    240912-pzn73avhlm

  • MD5

    dbaa20f915d571d7ae18680550cee406

  • SHA1

    0b6aed2db0c2334c8fb4bdd76e8f6ddc60a98707

  • SHA256

    475b9d791c60e67139b665c262ce187b083f90c2bd3aaeccb2ee12ad75748377

  • SHA512

    e003ecbad0ed80731635b98c1b7306680cf91fe06692da649cdcaa30c1288a4056c0fecad112e98d1a8ea5b49b6ced750571a3307853b4f3259a02e89622ee95

  • SSDEEP

    1536:QrUHB8lUwrPuvbZgOTSdlbOT5dUPyUw6m7YOmP+P8SE7x:MUH/v1edlb8oPyxYOE+P8Sax

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:11

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      TDpremium.exe

    • Size

      74KB

    • MD5

      dbaa20f915d571d7ae18680550cee406

    • SHA1

      0b6aed2db0c2334c8fb4bdd76e8f6ddc60a98707

    • SHA256

      475b9d791c60e67139b665c262ce187b083f90c2bd3aaeccb2ee12ad75748377

    • SHA512

      e003ecbad0ed80731635b98c1b7306680cf91fe06692da649cdcaa30c1288a4056c0fecad112e98d1a8ea5b49b6ced750571a3307853b4f3259a02e89622ee95

    • SSDEEP

      1536:QrUHB8lUwrPuvbZgOTSdlbOT5dUPyUw6m7YOmP+P8SE7x:MUH/v1edlb8oPyxYOE+P8Sax

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks