General

  • Target

    9b784a455868d9670106d82c504421506b94c040f1aa8d3bf129d6306b4db287N.exe

  • Size

    76KB

  • Sample

    240925-qb2nxswhqq

  • MD5

    51b18ca06caef067d41e3f55234ce9d0

  • SHA1

    5346383ed9415a479c9dad0dbb7eb6ae6a5545cb

  • SHA256

    9b784a455868d9670106d82c504421506b94c040f1aa8d3bf129d6306b4db287

  • SHA512

    48ec46d289f9075bd89682a070a79bc5ed832fe1fb6b7c31e2a4331550bddc2013892784e0fc9433035800b188e9a683fc1bfecfd1f75678db18be87c16b6cbb

  • SSDEEP

    1536:uAyhYQDNkoAVOV066wJZzZ+bDyNiQw4gH6DD6O1+WPeURcb:KiEmoAwxzZ+bDys7OsWS

Malware Config

Extracted

Family

xworm

C2

week-measures.gl.at.ply.gg:52951

Attributes
  • Install_directory

    %AppData%

  • install_file

    BrowserUpdate.exe

  • telegram

    https://api.telegram.org/bot7409084272:AAGfvawizs5psSM16en9CLFzI0ZQnCNB3SA

Targets

    • Target

      9b784a455868d9670106d82c504421506b94c040f1aa8d3bf129d6306b4db287N.exe

    • Size

      76KB

    • MD5

      51b18ca06caef067d41e3f55234ce9d0

    • SHA1

      5346383ed9415a479c9dad0dbb7eb6ae6a5545cb

    • SHA256

      9b784a455868d9670106d82c504421506b94c040f1aa8d3bf129d6306b4db287

    • SHA512

      48ec46d289f9075bd89682a070a79bc5ed832fe1fb6b7c31e2a4331550bddc2013892784e0fc9433035800b188e9a683fc1bfecfd1f75678db18be87c16b6cbb

    • SSDEEP

      1536:uAyhYQDNkoAVOV066wJZzZ+bDyNiQw4gH6DD6O1+WPeURcb:KiEmoAwxzZ+bDys7OsWS

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks