General

  • Target

    PM-DETAILS-STQRT5RX-102024.zip

  • Size

    10KB

  • Sample

    241031-rmxd1szdpb

  • MD5

    3fab295ba12afc0e54bd7c627995a6b4

  • SHA1

    790fd7a0920e8bbee16d2ee9071a7e7224943900

  • SHA256

    59ce094776dc5fd92d69b3563377768dc9c00a9db405578c0e02ee429db9f684

  • SHA512

    fd0766f28e3ea81f55ab7710285942c9e9dc8488044714896c009ba259fd6b9053f19d17a267e46db1b541e6d181f123e4838f20c50a1ea087aa31d2704e00ee

  • SSDEEP

    192:MU3X/sVK+BvVGKxqttcV2alIETYIEAptGLFvBy7:MgX/sVzRAaleHG0L9E

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://85.209.11.15/q/9.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://85.209.11.15/q/45.png

Extracted

Family

xworm

C2

85.209.11.15:4404

Attributes
  • install_file

    USB.exe

Targets

    • Target

      PM-DETAILS-STQRT5RX-102024.pdf.txt

    • Size

      584KB

    • MD5

      5513c9002d741f622e82e61505c8255a

    • SHA1

      c3d1b2fe4e9d382e448261dc4fcbca1c17859a17

    • SHA256

      a7db6879ea9bb70d8d8d9c22e620fc69187d0fa226e7eb6f89ee6fc226433352

    • SHA512

      a61f6cda41cd38c904ef1c9ce2365a0c82b10673523db6d9bf2ab89ace088a6c80f859edf9e1136cd6929f050ace025650fba0e80eadaa4d281909f830a674dd

    • SSDEEP

      1536:7E+E+EBE0E3E0EjEDE0EdE0EBE0x0EgE9EdE+E+EBE0E3E0E0E0E0E0E0EBE0E0n:YFyN

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks