General

  • Target

    svchost (1).exe

  • Size

    82KB

  • Sample

    240914-x7myza1gnm

  • MD5

    ada1fa7e34fa69a5cd24dc1d1b3debae

  • SHA1

    7296af10c7d488e99a4ac9baa7320a8a6fee4ad9

  • SHA256

    11b78f00904b9490b7249e720c6438289d667e19785dfd0495f85603f1fbfaac

  • SHA512

    323b57f769ca8796e14b64a0692b97ff202f31eccf013c42606e4a678cdf32ebedfaef875e8141faba2f1ce65e34317f82f2085f8954dab865a2f6e6503f5923

  • SSDEEP

    1536:LY8aA1uBsDOS2Cxu1fsLtMnveTFVwKbkezlfCRYSX68i+xDO5j+n2h2PiU:MQ1uRS2CxsIVMKbkezVWhhieO5j+2GR

Malware Config

Extracted

Family

xworm

C2

147.185.221.22:7689

127.0.0.1:7689

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot7460424057:AAFqb7sl9YoUjtnfCXABy_ETYSrIdrvDNo8/sendMessage?chat_id=7309152263

Targets

    • Target

      svchost (1).exe

    • Size

      82KB

    • MD5

      ada1fa7e34fa69a5cd24dc1d1b3debae

    • SHA1

      7296af10c7d488e99a4ac9baa7320a8a6fee4ad9

    • SHA256

      11b78f00904b9490b7249e720c6438289d667e19785dfd0495f85603f1fbfaac

    • SHA512

      323b57f769ca8796e14b64a0692b97ff202f31eccf013c42606e4a678cdf32ebedfaef875e8141faba2f1ce65e34317f82f2085f8954dab865a2f6e6503f5923

    • SSDEEP

      1536:LY8aA1uBsDOS2Cxu1fsLtMnveTFVwKbkezlfCRYSX68i+xDO5j+n2h2PiU:MQ1uRS2CxsIVMKbkezVWhhieO5j+2GR

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks