General

  • Target

    ValorLoader.exe

  • Size

    177KB

  • Sample

    240912-ypn9rasblc

  • MD5

    7ae6ff5995e374d09ba607addf5490cb

  • SHA1

    08a50366bfd91f0027b1c0e7d8f9f14bd738484c

  • SHA256

    e3d7084ab0b41ea0eb67688827a1fff7154d8e0923eb575be1873cac0151837b

  • SHA512

    90df27da662582374e261e688747bc94959faa554a3b759871be36b71cdae485d6babc9a240e1afdd597e30394ffb155eee7f483432742f7e55e43ff743c141c

  • SSDEEP

    1536:O1nDxGg9vKwCK6bH/7DdQ9pZnDobRpEj/s62vTrlwkS+OpISrAUEI:OZVGgNCK6xQLZn0bRphLRpOeSsUEI

Malware Config

Extracted

Family

xworm

C2

y-lbs.gl.at.ply.gg:41978

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      ValorLoader.exe

    • Size

      177KB

    • MD5

      7ae6ff5995e374d09ba607addf5490cb

    • SHA1

      08a50366bfd91f0027b1c0e7d8f9f14bd738484c

    • SHA256

      e3d7084ab0b41ea0eb67688827a1fff7154d8e0923eb575be1873cac0151837b

    • SHA512

      90df27da662582374e261e688747bc94959faa554a3b759871be36b71cdae485d6babc9a240e1afdd597e30394ffb155eee7f483432742f7e55e43ff743c141c

    • SSDEEP

      1536:O1nDxGg9vKwCK6bH/7DdQ9pZnDobRpEj/s62vTrlwkS+OpISrAUEI:OZVGgNCK6xQLZn0bRphLRpOeSsUEI

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks