General

  • Target

    d538155f9d03a9109f09d716733bba969677f569171852afabad28993d6b5dde.exe

  • Size

    46KB

  • Sample

    241002-b2evhs1bpl

  • MD5

    a66e7a2216c3bbea30a25a82acff1022

  • SHA1

    472c1c23e1444f595791bbd53b8d2619250ae727

  • SHA256

    d538155f9d03a9109f09d716733bba969677f569171852afabad28993d6b5dde

  • SHA512

    419655c5063b080be51e266ed5281ec97593de47d9fbdd998b7b2e58bea0f414d0725a127deeb8ae18d56aeed8c1650d5b508b6eef7aa77782e5f4a9657fd564

  • SSDEEP

    768:6oCKLEXpREtWHWqXTst7IOL6jiAYHyvj7dehVQdIwHzEypFYeuoGAto6hlUcuW1R:KPKoz

Malware Config

Targets

    • Target

      d538155f9d03a9109f09d716733bba969677f569171852afabad28993d6b5dde.exe

    • Size

      46KB

    • MD5

      a66e7a2216c3bbea30a25a82acff1022

    • SHA1

      472c1c23e1444f595791bbd53b8d2619250ae727

    • SHA256

      d538155f9d03a9109f09d716733bba969677f569171852afabad28993d6b5dde

    • SHA512

      419655c5063b080be51e266ed5281ec97593de47d9fbdd998b7b2e58bea0f414d0725a127deeb8ae18d56aeed8c1650d5b508b6eef7aa77782e5f4a9657fd564

    • SSDEEP

      768:6oCKLEXpREtWHWqXTst7IOL6jiAYHyvj7dehVQdIwHzEypFYeuoGAto6hlUcuW1R:KPKoz

    • Detect Xworm Payload

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Download via BitsAdmin

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks