General

  • Target

    4cc4898e0310d3a844d7844980c46a3b89296c1f3f7699f7360dad6657ae6564

  • Size

    1.1MB

  • Sample

    241031-pnvwgayclc

  • MD5

    042ace9bd31cb0d3933b4e45fc67e94f

  • SHA1

    b96ec7bd230a671a6b619e198fb35b9faf88f8f3

  • SHA256

    4cc4898e0310d3a844d7844980c46a3b89296c1f3f7699f7360dad6657ae6564

  • SHA512

    b5c30a5ce1503d515b8039a185881353d46649193131029ad6df18306505bcea7ff2fc9088548be8707a6cdbe62b09d010d391c592f7637d060438936c9eb914

  • SSDEEP

    24576:kjtjdwlwO3GZOG2mIVHzDqc2gaXstJvl22/rmfcVm15a:kjFdwlWYb/TDZA2/jM

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:42413

23.ip.gl.ply.gg:42413

oh-recognition.gl.at.ply.gg:42413

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    chrome.exe

Targets

    • Target

      4cc4898e0310d3a844d7844980c46a3b89296c1f3f7699f7360dad6657ae6564

    • Size

      1.1MB

    • MD5

      042ace9bd31cb0d3933b4e45fc67e94f

    • SHA1

      b96ec7bd230a671a6b619e198fb35b9faf88f8f3

    • SHA256

      4cc4898e0310d3a844d7844980c46a3b89296c1f3f7699f7360dad6657ae6564

    • SHA512

      b5c30a5ce1503d515b8039a185881353d46649193131029ad6df18306505bcea7ff2fc9088548be8707a6cdbe62b09d010d391c592f7637d060438936c9eb914

    • SSDEEP

      24576:kjtjdwlwO3GZOG2mIVHzDqc2gaXstJvl22/rmfcVm15a:kjFdwlWYb/TDZA2/jM

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks