General

  • Target

    atw7ir_1.rar

  • Size

    156KB

  • Sample

    241028-x3662stjfx

  • MD5

    70334252e42eaacc4797b94b2b083092

  • SHA1

    feefba626ace211224bc2c6eab696ec383cfff43

  • SHA256

    77a83d282a11436ce98f3135c4c52833be9a704a507bd8d53f5b8bc456419f9d

  • SHA512

    7f96dcc8581fe2a24ee384d6a1a1a9dd73bb6391be9dc05a2e6047dc52e0fa0ae7fb7ee4fa88c09c8b2eea8553c70452da5d15bbf7b7e4870ce99566a3cab045

  • SSDEEP

    3072:AUySvS21PhEeOhRH5GWoOtqTCz9FkjoYIfy0hIN1PLWey40h/ib:qSvSqNO35GWki5fjhIzzWey4k/ib

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    winlogon.exe

  • pastebin_url

    https://pastebin.com/raw/QUwdrCNg

Targets

    • Target

      atw7ir_1.rar

    • Size

      156KB

    • MD5

      70334252e42eaacc4797b94b2b083092

    • SHA1

      feefba626ace211224bc2c6eab696ec383cfff43

    • SHA256

      77a83d282a11436ce98f3135c4c52833be9a704a507bd8d53f5b8bc456419f9d

    • SHA512

      7f96dcc8581fe2a24ee384d6a1a1a9dd73bb6391be9dc05a2e6047dc52e0fa0ae7fb7ee4fa88c09c8b2eea8553c70452da5d15bbf7b7e4870ce99566a3cab045

    • SSDEEP

      3072:AUySvS21PhEeOhRH5GWoOtqTCz9FkjoYIfy0hIN1PLWey40h/ib:qSvSqNO35GWki5fjhIzzWey4k/ib

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks