General

  • Target

    TexPerm.exe

  • Size

    11.2MB

  • Sample

    241009-3gjfrawhqj

  • MD5

    edd32d80dd14f84c7924e4af2953ba9e

  • SHA1

    0caf3a1acc853056616d9348aa93e8c0e11e3e99

  • SHA256

    95144e30ef6994482dd42a0ca261014bb9e2d3a3ca3520057918f6c1d4011a84

  • SHA512

    69e2eb5b81f2b4060eca0b66c88eb30c7f8936adce48bb4fe38bfeefd34d7ed0d152463d26c21dd159888f263d23a4206f0c332e24bce8f6e8a1d00ae221f063

  • SSDEEP

    196608:84ukkzY1CYQC8H6PWla1FsJ2kdEimSkXrXhUCrcfUUYuH+wDaLs5:84uBY1CY58H6f1FnkdRQbXhUCQcQm2

Malware Config

Extracted

Family

xworm

C2

78.69.106.17:8000

Attributes
  • Install_directory

    %AppData%

  • install_file

    Update.exe

Targets

    • Target

      TexPerm.exe

    • Size

      11.2MB

    • MD5

      edd32d80dd14f84c7924e4af2953ba9e

    • SHA1

      0caf3a1acc853056616d9348aa93e8c0e11e3e99

    • SHA256

      95144e30ef6994482dd42a0ca261014bb9e2d3a3ca3520057918f6c1d4011a84

    • SHA512

      69e2eb5b81f2b4060eca0b66c88eb30c7f8936adce48bb4fe38bfeefd34d7ed0d152463d26c21dd159888f263d23a4206f0c332e24bce8f6e8a1d00ae221f063

    • SSDEEP

      196608:84ukkzY1CYQC8H6PWla1FsJ2kdEimSkXrXhUCrcfUUYuH+wDaLs5:84uBY1CY58H6f1FnkdRQbXhUCQcQm2

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks