General

  • Target

    YL81L_file.exe

  • Size

    35KB

  • Sample

    241031-f8ewbazjcz

  • MD5

    1b76c0d5d1d6a5197d055223b134dcca

  • SHA1

    b8092605ecbb529a7372e42b7cbcda4b55e78ef1

  • SHA256

    024d5a39a58cae8343c5ee34629868c6440ea7a3dce8a2f226c8161d5005d196

  • SHA512

    27dad7330d431d48744d8aa348c6377deb51917a4f2ed6510ec6f9bbda55ea386ef3fd5e5039b921163d9d3c81f5423c6648062c0925d86cf05c63ca978805e3

  • SSDEEP

    384:vSBqVEqKykkTwusE+E33Rz3UXmbXLZoWR27vHsJQcXT/G58pkFyHBLTIZwgG+Vv1:EQDb3QIXDh7GVFy79evOjh2yED

Malware Config

Extracted

Family

xworm

Version

5.0

C2

didjmdk3nindi3nd.zapto.org:7000

70.241.39.14:7000

Mutex

Q6QXs3CM0drEuir0

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    XC.exe

aes.plain

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot6217988193:AAFiJwdcFHDuCM08fAA_dnBQZGLDPSVjUQY/sendDocument

Targets

    • Target

      YL81L_file.exe

    • Size

      35KB

    • MD5

      1b76c0d5d1d6a5197d055223b134dcca

    • SHA1

      b8092605ecbb529a7372e42b7cbcda4b55e78ef1

    • SHA256

      024d5a39a58cae8343c5ee34629868c6440ea7a3dce8a2f226c8161d5005d196

    • SHA512

      27dad7330d431d48744d8aa348c6377deb51917a4f2ed6510ec6f9bbda55ea386ef3fd5e5039b921163d9d3c81f5423c6648062c0925d86cf05c63ca978805e3

    • SSDEEP

      384:vSBqVEqKykkTwusE+E33Rz3UXmbXLZoWR27vHsJQcXT/G58pkFyHBLTIZwgG+Vv1:EQDb3QIXDh7GVFy79evOjh2yED

    • Detect Xworm Payload

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks