Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    880cb80d1d206d83854ee3e6a2ffd5d25a1d3acaa2aa1513842243af5fee233a.exe

  • Size

    41KB

  • Sample

    240921-bvgersyeme

  • MD5

    0897b11d95ee6b03e0aa842a221983c9

  • SHA1

    b1bd0eb1d20bd70706f3a19707719fad18aa4365

  • SHA256

    880cb80d1d206d83854ee3e6a2ffd5d25a1d3acaa2aa1513842243af5fee233a

  • SHA512

    39bdcf88660ee14a0c6b3b6d2402991ab80bbfa05b526cd6d5b10c035a6ebf63b349b3f2c9532f048301f8415c2bbed57bc0f4409273fe8ec2014a63dbd9dc72

  • SSDEEP

    768:f2jIdDG5gT9kyOz8me4jl2QX/p3/FWPG9sq96OOwhfQiXdf:+jIdDG5Dxzleyl2QRFv9sC6OOwRxXp

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

md2hTRMYBpbXprs1

Attributes
  • Install_directory

    %AppData%

  • install_file

    Steam.exe

  • pastebin_url

    https://pastebin.com/raw/Pit7WkAV

  • telegram

    https://api.telegram.org/bot7494729704:AAGLY8mnPxkjjCvoEz520yCBT4GLhlnhRaI/sendMessage?chat_id=7222032715

aes.plain

Targets

    • Target

      880cb80d1d206d83854ee3e6a2ffd5d25a1d3acaa2aa1513842243af5fee233a.exe

    • Size

      41KB

    • MD5

      0897b11d95ee6b03e0aa842a221983c9

    • SHA1

      b1bd0eb1d20bd70706f3a19707719fad18aa4365

    • SHA256

      880cb80d1d206d83854ee3e6a2ffd5d25a1d3acaa2aa1513842243af5fee233a

    • SHA512

      39bdcf88660ee14a0c6b3b6d2402991ab80bbfa05b526cd6d5b10c035a6ebf63b349b3f2c9532f048301f8415c2bbed57bc0f4409273fe8ec2014a63dbd9dc72

    • SSDEEP

      768:f2jIdDG5gT9kyOz8me4jl2QX/p3/FWPG9sq96OOwhfQiXdf:+jIdDG5Dxzleyl2QRFv9sC6OOwRxXp

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks