General

  • Target

    OneDrive.exe

  • Size

    270.2MB

  • Sample

    240927-x16shaxemh

  • MD5

    8a1d83bd60b0bf8b9ab7aa48951023e8

  • SHA1

    af1fa47081d87d972b970851a6a55bcdd5db2050

  • SHA256

    fb4b4f1d5eff5554690fef39a65a76255e6c5587ddc98499ab3a7850b507cbfd

  • SHA512

    b4042b8b17c75af7984e06678efd871c1670bba74ca07b403bb0a03497e804905f2d0a72c022071f836605bf1cb95884672cdcd1d62111a7ea5f203e43e89d9f

  • SSDEEP

    6291456:mHqyRktm833OwpWtAmlVKllT1wpzVX97XBf7ekh6PAGU:nyRkthewpWtxlV21wppX97RF64T

Malware Config

Targets

    • Target

      OneDrive.exe

    • Size

      270.2MB

    • MD5

      8a1d83bd60b0bf8b9ab7aa48951023e8

    • SHA1

      af1fa47081d87d972b970851a6a55bcdd5db2050

    • SHA256

      fb4b4f1d5eff5554690fef39a65a76255e6c5587ddc98499ab3a7850b507cbfd

    • SHA512

      b4042b8b17c75af7984e06678efd871c1670bba74ca07b403bb0a03497e804905f2d0a72c022071f836605bf1cb95884672cdcd1d62111a7ea5f203e43e89d9f

    • SSDEEP

      6291456:mHqyRktm833OwpWtAmlVKllT1wpzVX97XBf7ekh6PAGU:nyRkthewpWtxlV21wppX97RF64T

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks