General

  • Target

    30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15.vbs

  • Size

    130KB

  • Sample

    241027-lgskzsxcmp

  • MD5

    878ba89eaad87f86c7ff4e5fee1e1823

  • SHA1

    8f9496d5da92c9a0f64ffe5aa0ee0da259a9da1b

  • SHA256

    30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15

  • SHA512

    2ed93d10566fcd7bc312a321a4551611c08dc1de817cf89c5a46be1d8243b77a075896658dd92d5de9d66d7a5bed92b51d25e0729f06369ba673a12b1a37bc7b

  • SSDEEP

    3072:ZxQCCYVaCCq+c0C49NixM8B20HcO4uuxQCCYVaCCq+c0C49NixM8B20HcO4uA:Z2CCYsfq+cp49oa8B208Mu2CCYsfq+cm

Malware Config

Extracted

Family

xworm

Version

3.1

C2

xwor3july.duckdns.org:9402

Mutex

JIs7HXfvmVwG8wtR

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15.vbs

    • Size

      130KB

    • MD5

      878ba89eaad87f86c7ff4e5fee1e1823

    • SHA1

      8f9496d5da92c9a0f64ffe5aa0ee0da259a9da1b

    • SHA256

      30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15

    • SHA512

      2ed93d10566fcd7bc312a321a4551611c08dc1de817cf89c5a46be1d8243b77a075896658dd92d5de9d66d7a5bed92b51d25e0729f06369ba673a12b1a37bc7b

    • SSDEEP

      3072:ZxQCCYVaCCq+c0C49NixM8B20HcO4uuxQCCYVaCCq+c0C49NixM8B20HcO4uA:Z2CCYsfq+cp49oa8B208Mu2CCYsfq+cm

    • Detect Xworm Payload

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks