General

  • Target

    2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7

  • Size

    3KB

  • Sample

    240925-jvmksatfnl

  • MD5

    e4895b941c8ea6d76630d6fcb2002292

  • SHA1

    9e3038c82fd6767bfa224f361400fc89cd8d0d89

  • SHA256

    2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7

  • SHA512

    22c79a4fec72693f34933c1845c2225ba33cc9c11dd320a819e1c397dfa2ecc92ad752302fe161f247fd217cc30ec28a2959126a24a95269191dbe1fc473ea76

Malware Config

Extracted

Family

xworm

Version

5.0

C2

ALBANIAH3CKER.WORK.GD:7000

Mutex

IFhL8Is8edtDA6ZA

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7

    • Size

      3KB

    • MD5

      e4895b941c8ea6d76630d6fcb2002292

    • SHA1

      9e3038c82fd6767bfa224f361400fc89cd8d0d89

    • SHA256

      2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7

    • SHA512

      22c79a4fec72693f34933c1845c2225ba33cc9c11dd320a819e1c397dfa2ecc92ad752302fe161f247fd217cc30ec28a2959126a24a95269191dbe1fc473ea76

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks