General

  • Target

    Sairiss.exe

  • Size

    1.1MB

  • Sample

    240925-pat21sxfng

  • MD5

    de6f7554479d7c833f7441c00f53a0a4

  • SHA1

    205b9b083f05e4d4e2b9f05971030a4ddbdf034c

  • SHA256

    8af9363b9c2f60c264f19812b287e61accbdf0c4be10e500645ce760fbe5a32a

  • SHA512

    5fbfccec89cc21a7efcf184854ed2ca15b068552d1c86babb972ad4f8b2c6a5acbb7a2339e6d6fe0b3f37766e523d6083c2ce41b401b1364f4a459c1ebecfbc5

  • SSDEEP

    24576:rAM1FHWInxjjPZiHzNAjtIsdE2ajpoRvSNTv/FbpMgS20YX+iXFGKRc+JDke:8MX2In1cXsdEPjs+sR2jrVzRB2e

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    WindowsUpdate.exe

  • pastebin_url

    https://pastebin.com/raw/imbvawb9

Targets

    • Target

      Sairiss.exe

    • Size

      1.1MB

    • MD5

      de6f7554479d7c833f7441c00f53a0a4

    • SHA1

      205b9b083f05e4d4e2b9f05971030a4ddbdf034c

    • SHA256

      8af9363b9c2f60c264f19812b287e61accbdf0c4be10e500645ce760fbe5a32a

    • SHA512

      5fbfccec89cc21a7efcf184854ed2ca15b068552d1c86babb972ad4f8b2c6a5acbb7a2339e6d6fe0b3f37766e523d6083c2ce41b401b1364f4a459c1ebecfbc5

    • SSDEEP

      24576:rAM1FHWInxjjPZiHzNAjtIsdE2ajpoRvSNTv/FbpMgS20YX+iXFGKRc+JDke:8MX2In1cXsdEPjs+sR2jrVzRB2e

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks