General

  • Target

    Null menu.exe

  • Size

    484KB

  • Sample

    240927-t2s19atgpe

  • MD5

    cc5fdd81e44d6b85b629544133820a27

  • SHA1

    d5e8421ac31abddd23f2b00841d2ed5f671d2670

  • SHA256

    685247d0074365beb7fdd3942878bdf2fce06e7b1049f5cc803a50fa4e757d91

  • SHA512

    398b99025320847042717fcfb5a6f9b15f95583a7304f4e8315c1746c58ed46083cf133d9893ee6d187068a4c98216c15af6d010ec84119bc3fb9e8bcabde9e4

  • SSDEEP

    1536:GUU/LRr4lW/f4RQYvX3yb+bWwpfkABQBf6kOJZYJ/Hi6pkRpuuoRzakOJ+ON8xqE:GT+8XCnXCb+bWwANOJCJWkH/G4Z

Malware Config

Extracted

Family

xworm

C2

193.161.193.99:26331

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      Null menu.exe

    • Size

      484KB

    • MD5

      cc5fdd81e44d6b85b629544133820a27

    • SHA1

      d5e8421ac31abddd23f2b00841d2ed5f671d2670

    • SHA256

      685247d0074365beb7fdd3942878bdf2fce06e7b1049f5cc803a50fa4e757d91

    • SHA512

      398b99025320847042717fcfb5a6f9b15f95583a7304f4e8315c1746c58ed46083cf133d9893ee6d187068a4c98216c15af6d010ec84119bc3fb9e8bcabde9e4

    • SSDEEP

      1536:GUU/LRr4lW/f4RQYvX3yb+bWwpfkABQBf6kOJZYJ/Hi6pkRpuuoRzakOJ+ON8xqE:GT+8XCnXCb+bWwANOJCJWkH/G4Z

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks