General

  • Target

    4f0190aabf763b79ab3f5649b12cc5bf3c545b2e7047f6befca7638918123fe2.unknown

  • Size

    689KB

  • Sample

    240924-bqklmasamn

  • MD5

    0db817d8d07638cd81adee6852de57f7

  • SHA1

    ca6589dcd6d33e3cc5f65d492b81ae376606d9dd

  • SHA256

    4f0190aabf763b79ab3f5649b12cc5bf3c545b2e7047f6befca7638918123fe2

  • SHA512

    e4d57643aa231040a079f35c9c8365dab6291f76a1ff6f28db373d7d664f2aae240c85a585aa1908bd744176e7e437d5bd9c0e78c22f7f48de12bacb159befc8

  • SSDEEP

    1536:VPPPPPPPPPPPPPPPPPPPPPPPE77777777777777777777777777777777777777Y:rnRC7pT0FT2w

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://drive.google.com/uc?export=download&id=

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.desckvbrat.com.br
  • Port:
    21
  • Username:
    desckvbrat1
  • Password:
    developerpro21578Jp@@

Extracted

Family

xworm

Version

5.0

C2

dianganadores.duckdns.org:7080

:7080

Mutex

qGs2m5ptuM4htdW5

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      4f0190aabf763b79ab3f5649b12cc5bf3c545b2e7047f6befca7638918123fe2.unknown

    • Size

      689KB

    • MD5

      0db817d8d07638cd81adee6852de57f7

    • SHA1

      ca6589dcd6d33e3cc5f65d492b81ae376606d9dd

    • SHA256

      4f0190aabf763b79ab3f5649b12cc5bf3c545b2e7047f6befca7638918123fe2

    • SHA512

      e4d57643aa231040a079f35c9c8365dab6291f76a1ff6f28db373d7d664f2aae240c85a585aa1908bd744176e7e437d5bd9c0e78c22f7f48de12bacb159befc8

    • SSDEEP

      1536:VPPPPPPPPPPPPPPPPPPPPPPPE77777777777777777777777777777777777777Y:rnRC7pT0FT2w

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks