General

  • Target

    GBFJ2_DeadPayload.exe

  • Size

    500KB

  • Sample

    241031-ky6nhawaln

  • MD5

    36656751a6f5235ee7733f649f2333f1

  • SHA1

    ce686bf0173d8fbc77bda352ec44021d1bc48630

  • SHA256

    fe2ab997f171c9095fd8bfa2f0355d12d336e4b98e3305836ae565d1a4667fb0

  • SHA512

    fb84cc76183a1a89017c1f33a95c0f8e040a422549f85b29a171373a909e3e8b9cbecfa428eeab42a6c816f77e522f168f2428622b2a35bc2e1324cd9e535b88

  • SSDEEP

    12288:U3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sdzO:OkGTy

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

QgVg78qW15uIsQ4H

Attributes
  • Install_directory

    %Public%

  • install_file

    ohh.exe

  • pastebin_url

    https://pastebin.com/raw/J09JweeH

aes.plain

Targets

    • Target

      GBFJ2_DeadPayload.exe

    • Size

      500KB

    • MD5

      36656751a6f5235ee7733f649f2333f1

    • SHA1

      ce686bf0173d8fbc77bda352ec44021d1bc48630

    • SHA256

      fe2ab997f171c9095fd8bfa2f0355d12d336e4b98e3305836ae565d1a4667fb0

    • SHA512

      fb84cc76183a1a89017c1f33a95c0f8e040a422549f85b29a171373a909e3e8b9cbecfa428eeab42a6c816f77e522f168f2428622b2a35bc2e1324cd9e535b88

    • SSDEEP

      12288:U3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sdzO:OkGTy

    • Detect Xworm Payload

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks