General

  • Target

    Solara.exe

  • Size

    91KB

  • Sample

    240918-z4zjpstfqj

  • MD5

    b4be3f19527e6c2b0065e742f9c1f838

  • SHA1

    57156feb7c069cd31c939a8a0540e7d46e0c5427

  • SHA256

    8f24c89391201e63ac570b9ace47eac4cac06157890056d7c09ac762d4c27cc1

  • SHA512

    cbaaedd1ea1da87e86144058894e47b91a59c518e4a23c40d928d64f7fd542070c58d552e5e19e8640796967b4b4eb4106c11e6336f020f82ef90296861f327e

  • SSDEEP

    1536:VMK650osONtFw9CuK6OOCtKiQ6Fm1AMtaqlzvgb1j5PMzk3Cletsy+q3:l+VscFw9CLOCXQOmu5KgBdPMzhetsDq3

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:13970

accessories-retrieve.gl.at.ply.gg:13970

Mutex

nipMTFYV6XUBvXZW

Attributes
  • Install_directory

    %AppData%

  • install_file

    Loader.exe

aes.plain

Targets

    • Target

      Solara.exe

    • Size

      91KB

    • MD5

      b4be3f19527e6c2b0065e742f9c1f838

    • SHA1

      57156feb7c069cd31c939a8a0540e7d46e0c5427

    • SHA256

      8f24c89391201e63ac570b9ace47eac4cac06157890056d7c09ac762d4c27cc1

    • SHA512

      cbaaedd1ea1da87e86144058894e47b91a59c518e4a23c40d928d64f7fd542070c58d552e5e19e8640796967b4b4eb4106c11e6336f020f82ef90296861f327e

    • SSDEEP

      1536:VMK650osONtFw9CuK6OOCtKiQ6Fm1AMtaqlzvgb1j5PMzk3Cletsy+q3:l+VscFw9CLOCXQOmu5KgBdPMzhetsDq3

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks