General

  • Target

    4571751b2b7477fded0012f46aded7c86fb93194980897418c17ac917c4d4cc1.exe

  • Size

    163KB

  • Sample

    241031-csptsswkhy

  • MD5

    72f5f19b35b22d82d8459f5e0739c248

  • SHA1

    0218dd2b354dcfdff2a11d06b6cf57f53987e9eb

  • SHA256

    4571751b2b7477fded0012f46aded7c86fb93194980897418c17ac917c4d4cc1

  • SHA512

    ae5fb16700e76a79049b9b92f13ead1d611b490a1e447adcc1a6da35be611e2c1e2fc618d17cc4f3a2052fd9b4cf261e12c1464474590c30647a40580e9e2d07

  • SSDEEP

    1536:9QJaAtooQh0elU0qT9rbRCKGOjEkb2yMnx8Xb627dOnZzWEU:eJaNp9lVYoKGNkb2ymxMhOnZSEU

Malware Config

Extracted

Family

xworm

C2

vehicle-temp.gl.at.ply.gg:1930

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    MicrosoftClient.exe

  • telegram

    https://api.telegram.org/bot7754858173:AAGHhysa0geGaNnoiGNJaE5p14tWFWtQDWs/sendMessage?chat_id=7247076886

Targets

    • Target

      4571751b2b7477fded0012f46aded7c86fb93194980897418c17ac917c4d4cc1.exe

    • Size

      163KB

    • MD5

      72f5f19b35b22d82d8459f5e0739c248

    • SHA1

      0218dd2b354dcfdff2a11d06b6cf57f53987e9eb

    • SHA256

      4571751b2b7477fded0012f46aded7c86fb93194980897418c17ac917c4d4cc1

    • SHA512

      ae5fb16700e76a79049b9b92f13ead1d611b490a1e447adcc1a6da35be611e2c1e2fc618d17cc4f3a2052fd9b4cf261e12c1464474590c30647a40580e9e2d07

    • SSDEEP

      1536:9QJaAtooQh0elU0qT9rbRCKGOjEkb2yMnx8Xb627dOnZzWEU:eJaNp9lVYoKGNkb2ymxMhOnZSEU

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks