General

  • Target

    PINCRACKERv2.exe

  • Size

    12.4MB

  • Sample

    240929-3raatswflr

  • MD5

    d934ff348a865cc12262a7df63556bc0

  • SHA1

    23259e29c1dc49c4c023a5944079bb488da908f3

  • SHA256

    66921e2919d00738ad3f048f0334c504a1e0c3a197a0f1eadb204d547a3c3b57

  • SHA512

    b1a44d133ee850215aa01d070c8112aa0952fdf18a8b7faca3f73c296cda6fd9f2ed400a96bf2ac07f307cb7d7859b35cb881471c08b09b4f50692062149516f

  • SSDEEP

    393216:WtcqWls+P7XbLf8bhf0u08cLaGou0JdKi6xkqe3yO4hjE:WtZWlFP7XbL0py8ceGouKoi6Gq3OP

Malware Config

Extracted

Family

xworm

Version

5.0

C2

camera-leadership.gl.at.ply.gg:48241

Mutex

xfoLhSSL3ZKAFHgp

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7517837255:AAG0nEVWhvscgRKAU7DCjZPeuglJdFmcYws/sendMessage?chat_id=7538845070

aes.plain

Extracted

Family

xworm

Version

5.1

C2

camera-leadership.gl.at.ply.gg:9999

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7517837255:AAG0nEVWhvscgRKAU7DCjZPeuglJdFmcYws/sendMessage?chat_id=7538845070

Targets

    • Target

      PINCRACKERv2.exe

    • Size

      12.4MB

    • MD5

      d934ff348a865cc12262a7df63556bc0

    • SHA1

      23259e29c1dc49c4c023a5944079bb488da908f3

    • SHA256

      66921e2919d00738ad3f048f0334c504a1e0c3a197a0f1eadb204d547a3c3b57

    • SHA512

      b1a44d133ee850215aa01d070c8112aa0952fdf18a8b7faca3f73c296cda6fd9f2ed400a96bf2ac07f307cb7d7859b35cb881471c08b09b4f50692062149516f

    • SSDEEP

      393216:WtcqWls+P7XbLf8bhf0u08cLaGou0JdKi6xkqe3yO4hjE:WtZWlFP7XbL0py8ceGouKoi6Gq3OP

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks