Resubmissions

28-10-2024 00:28

241028-asb7lawcqb 10

21-10-2024 19:42

241021-yemm6ssdnd 10

General

  • Target

    FireFoxSetup.exe

  • Size

    171KB

  • Sample

    241028-asb7lawcqb

  • MD5

    014b0ea8fe05df0fdea1710537dabe57

  • SHA1

    91b47cd15009aceba1040cadabf3aa7cd6279a48

  • SHA256

    340830c7cba818a4e94a7791432f6a3e29bf103ebb47c70a6cb61e53c0ee5b2a

  • SHA512

    8503e8cd78442535226f41ba5d12dc0a20732940a24f865eb156ab9e75d6b4330bfdd10abba8add37713447317280f7b30f8c30bfb9f8642d15506a17e4d12d0

  • SSDEEP

    1536:qDEV10wHVJKuuwhSMEFv9by6POwWTCs6se7llqn17KineXd2wVKtivEYoNRh8RXt:dfjhaFv9bjOwFsgbcUieNJqKoPC5+Ls

Malware Config

Extracted

Family

xworm

Version

5.0

C2

147.185.221.22:43768

Mutex

2bRkaANDDdoPipKE

Attributes
  • Install_directory

    %AppData%

  • install_file

    FireFox.exe

aes.plain

Targets

    • Target

      FireFoxSetup.exe

    • Size

      171KB

    • MD5

      014b0ea8fe05df0fdea1710537dabe57

    • SHA1

      91b47cd15009aceba1040cadabf3aa7cd6279a48

    • SHA256

      340830c7cba818a4e94a7791432f6a3e29bf103ebb47c70a6cb61e53c0ee5b2a

    • SHA512

      8503e8cd78442535226f41ba5d12dc0a20732940a24f865eb156ab9e75d6b4330bfdd10abba8add37713447317280f7b30f8c30bfb9f8642d15506a17e4d12d0

    • SSDEEP

      1536:qDEV10wHVJKuuwhSMEFv9by6POwWTCs6se7llqn17KineXd2wVKtivEYoNRh8RXt:dfjhaFv9bjOwFsgbcUieNJqKoPC5+Ls

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks