General

  • Target

    DeadPayload.exe

  • Size

    498KB

  • Sample

    241031-xkbmessfpj

  • MD5

    f670c1aa001d28b1d25ef4aad6acb4e6

  • SHA1

    2c4ba73e114b9d43e2f45ffedc7cb0752c031488

  • SHA256

    e13d8263dd6f8363dc3955e51f49bde3f65cc3e2696f8cd2385828bcbd5ee2d4

  • SHA512

    ad326ffc975de4b0b22be1a12a6af6b1ebb26535155743939f07f57291ba66ffbdae6cd4b9b81126db13cb2eed2881e7e841b14277c77708b21ad8f3d9fe20c4

  • SSDEEP

    12288:83DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sd6:2kGTy

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

QgVg78qW15uIsQ4H

Attributes
  • Install_directory

    %Public%

  • install_file

    ohh.exe

aes.plain

Targets

    • Target

      DeadPayload.exe

    • Size

      498KB

    • MD5

      f670c1aa001d28b1d25ef4aad6acb4e6

    • SHA1

      2c4ba73e114b9d43e2f45ffedc7cb0752c031488

    • SHA256

      e13d8263dd6f8363dc3955e51f49bde3f65cc3e2696f8cd2385828bcbd5ee2d4

    • SHA512

      ad326ffc975de4b0b22be1a12a6af6b1ebb26535155743939f07f57291ba66ffbdae6cd4b9b81126db13cb2eed2881e7e841b14277c77708b21ad8f3d9fe20c4

    • SSDEEP

      12288:83DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sd6:2kGTy

    • Detect Xworm Payload

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks