General

  • Target

    HG7dj4_Receipt.zip

  • Size

    61KB

  • Sample

    241026-netrdatdnc

  • MD5

    c71b34977c0ffd303ccff1c66326b2b9

  • SHA1

    e40134cef129a4bd31504866bd691663d7dc3d26

  • SHA256

    5acd33e1e58647897cd7897305eec80d6c9228ec2fce8f972825b48ea16a8c74

  • SHA512

    157efa4e5d8247cd961cefa35b0740286ec5f2e92bf6d02f7c258537cf84466f0683a13c05e6a447667c2c9b8b4f2901869a6f31f139e59951caf174029cb519

  • SSDEEP

    1536:51qD5viGMHovnCKBr9O8ohhECn9RX3U0U/M5eu2AGIve5oW:51wv3+CnTgsCn9pkZE5eiGa8

Malware Config

Extracted

Family

xworm

Version

3.1

C2

xwor3july.duckdns.org:9402

Mutex

JIs7HXfvmVwG8wtR

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      c56D7_Receipt.vbs

    • Size

      130KB

    • MD5

      878ba89eaad87f86c7ff4e5fee1e1823

    • SHA1

      8f9496d5da92c9a0f64ffe5aa0ee0da259a9da1b

    • SHA256

      30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15

    • SHA512

      2ed93d10566fcd7bc312a321a4551611c08dc1de817cf89c5a46be1d8243b77a075896658dd92d5de9d66d7a5bed92b51d25e0729f06369ba673a12b1a37bc7b

    • SSDEEP

      3072:ZxQCCYVaCCq+c0C49NixM8B20HcO4uuxQCCYVaCCq+c0C49NixM8B20HcO4uA:Z2CCYsfq+cp49oa8B208Mu2CCYsfq+cm

    • Detect Xworm Payload

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks