General

  • Target

    20241001245bac5c1fa9cc473b6e76b4836bfe4favoslockerhijackloader

  • Size

    5.7MB

  • Sample

    241001-zzznxa1aml

  • MD5

    245bac5c1fa9cc473b6e76b4836bfe4f

  • SHA1

    7794f9d32ba675be661fb78c70e1ab7149eeab18

  • SHA256

    2ef3d4da1131b0d083b57ebaf81673f5711a1b8c3657cc8b0e9f4066d2b273da

  • SHA512

    97742eae20586bf8170067f56e3ba5d79f34f2a158f6c9f917efcd8f114aff625901e77ab907c9d57e97584fdfa87cd69132cddb63078628a8b2a0cbc4c6aaa7

  • SSDEEP

    98304:/NAq7yUIhuaAkrMmCqNAq7yUIhuaAkrMmCBNAq7yUIhuaAkrMmClOU/jIEeQfoRS:/+KFaRj+KFaRg+KFaRyFIF0wu

Malware Config

Extracted

Family

xworm

Version

3.1

C2

23.26.201.172:8899

Mutex

REaMgxQu68UQguvi

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      20241001245bac5c1fa9cc473b6e76b4836bfe4favoslockerhijackloader

    • Size

      5.7MB

    • MD5

      245bac5c1fa9cc473b6e76b4836bfe4f

    • SHA1

      7794f9d32ba675be661fb78c70e1ab7149eeab18

    • SHA256

      2ef3d4da1131b0d083b57ebaf81673f5711a1b8c3657cc8b0e9f4066d2b273da

    • SHA512

      97742eae20586bf8170067f56e3ba5d79f34f2a158f6c9f917efcd8f114aff625901e77ab907c9d57e97584fdfa87cd69132cddb63078628a8b2a0cbc4c6aaa7

    • SSDEEP

      98304:/NAq7yUIhuaAkrMmCqNAq7yUIhuaAkrMmCBNAq7yUIhuaAkrMmClOU/jIEeQfoRS:/+KFaRj+KFaRg+KFaRyFIF0wu

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks