General

  • Target

    2b685da51e11e912a197f6b099cc129ea596e0a17e1acda327a14da2f29cc14d.exe

  • Size

    886KB

  • Sample

    241031-xd2j9szrev

  • MD5

    5de66177f354c6897c28610c4f7bae57

  • SHA1

    e8ad1bee7ca5c991d1837eb59d0c9b4033e055bf

  • SHA256

    2b685da51e11e912a197f6b099cc129ea596e0a17e1acda327a14da2f29cc14d

  • SHA512

    a4b7044c28e0ead07ade9325de64e0e1e9069d27ab4d228df4acc84952a9c9f7e05e04cdae7adb05322e413756cf906163ccf728564258ad21d558da1da471e0

  • SSDEEP

    24576:pIRvCHulB7EdTNb8aJFWKtJ8Bx2BIQPGfK9wNJnkSDSvmEF:pIRvCOlBOF8aJFWKtJ8Bx2BXSK6NJ

Malware Config

Extracted

Family

xworm

C2

nohicsq.localto.net:3985

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      2b685da51e11e912a197f6b099cc129ea596e0a17e1acda327a14da2f29cc14d.exe

    • Size

      886KB

    • MD5

      5de66177f354c6897c28610c4f7bae57

    • SHA1

      e8ad1bee7ca5c991d1837eb59d0c9b4033e055bf

    • SHA256

      2b685da51e11e912a197f6b099cc129ea596e0a17e1acda327a14da2f29cc14d

    • SHA512

      a4b7044c28e0ead07ade9325de64e0e1e9069d27ab4d228df4acc84952a9c9f7e05e04cdae7adb05322e413756cf906163ccf728564258ad21d558da1da471e0

    • SSDEEP

      24576:pIRvCHulB7EdTNb8aJFWKtJ8Bx2BIQPGfK9wNJnkSDSvmEF:pIRvCOlBOF8aJFWKtJ8Bx2BXSK6NJ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks