General

  • Target

    svchost (1).exe

  • Size

    81KB

  • Sample

    240914-mbfjxayekn

  • MD5

    588206c122575251383457844ba3cd6d

  • SHA1

    1d93f8e11ac13cb4ce162813e8b823c7f0f97869

  • SHA256

    bb99db62e08be632d6df2ab8a7d802451c031dee8f2521731873c8ad6092143a

  • SHA512

    3aa52b43b399f12eec1dfee3f584a46186949e39dea14c43362b4d27d78b86ae95de01b3f76ac9562ddc8afd28fbdb59de36e858553826d029e5bdfa98880d8c

  • SSDEEP

    1536:a5zjdnQPdPdXSqcGDF0iZRbO0FVbuqVAr06sSmDHOkQJUv3PK0P:aheVPdXkGDFR/bO0FWWSmDHOnJi3zP

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:46532

147.185.221.22:46532

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

Targets

    • Target

      svchost (1).exe

    • Size

      81KB

    • MD5

      588206c122575251383457844ba3cd6d

    • SHA1

      1d93f8e11ac13cb4ce162813e8b823c7f0f97869

    • SHA256

      bb99db62e08be632d6df2ab8a7d802451c031dee8f2521731873c8ad6092143a

    • SHA512

      3aa52b43b399f12eec1dfee3f584a46186949e39dea14c43362b4d27d78b86ae95de01b3f76ac9562ddc8afd28fbdb59de36e858553826d029e5bdfa98880d8c

    • SSDEEP

      1536:a5zjdnQPdPdXSqcGDF0iZRbO0FVbuqVAr06sSmDHOkQJUv3PK0P:aheVPdXkGDFR/bO0FWWSmDHOnJi3zP

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks