General

  • Target

    order_receipt#277.vbs

  • Size

    138KB

  • Sample

    241029-xw995axkf1

  • MD5

    e845c7177b3fbef4bacea00df938bc28

  • SHA1

    af8f1912ee1d5e2daa119d52537fc09a8316aa4d

  • SHA256

    9eb00c37db0331a7a0ef2056bda5ffe8fde8d812f4d3f8b54f278ba041cfd2a0

  • SHA512

    85c0b69a7f3b615b0796f882620d40c4bc5b8f79b3adffc11cee3b08085879f55c78c81a65671c2701139d4c68c39b27178730241be00a0054c37809936b0043

  • SSDEEP

    1536:Qyb8Rgt5pzGGwEM9cW/9WoOv5xvX7Nvx48bOAobVHL3x:QybOgt5pCGwEM/FWXvnLNvxrbO3bVr3x

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Extracted

Family

xworm

Version

5.0

Mutex

aq3Fac3Pq9GHgZuk

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/juxAi7cy

aes.plain

Targets

    • Target

      order_receipt#277.vbs

    • Size

      138KB

    • MD5

      e845c7177b3fbef4bacea00df938bc28

    • SHA1

      af8f1912ee1d5e2daa119d52537fc09a8316aa4d

    • SHA256

      9eb00c37db0331a7a0ef2056bda5ffe8fde8d812f4d3f8b54f278ba041cfd2a0

    • SHA512

      85c0b69a7f3b615b0796f882620d40c4bc5b8f79b3adffc11cee3b08085879f55c78c81a65671c2701139d4c68c39b27178730241be00a0054c37809936b0043

    • SSDEEP

      1536:Qyb8Rgt5pzGGwEM9cW/9WoOv5xvX7Nvx48bOAobVHL3x:QybOgt5pCGwEM/FWXvnLNvxrbO3bVr3x

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks