General

  • Target

    72905a621da6ddc614abf5385b2279779b556792400406b6967ab36a8b6bd39e.exe

  • Size

    298KB

  • Sample

    241101-enpdksvmav

  • MD5

    3e9007a477dd81264659889b9e245c8d

  • SHA1

    7d784a4b63b95f2330217b88e8b1d53b54533ffd

  • SHA256

    72905a621da6ddc614abf5385b2279779b556792400406b6967ab36a8b6bd39e

  • SHA512

    2438eab27f992c71fa9379dcf012ad89db79e1c79f92fd32f384c27644891b77ef1be5bec96021a3a44dcbc75085bb8425cf25d8cd80d6dca1e04b361a44a411

  • SSDEEP

    3072:InFK9onOjbJ2QAsSdADRq6ty71wtYM77ldY7AXTp2kA3:IFK9bJuwH77Ppj0kA

Malware Config

Extracted

Family

xworm

Version

5.0

C2

dane1c-58098.portmap.host:58098

Mutex

NsX6nPqhojvO4ihe

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      72905a621da6ddc614abf5385b2279779b556792400406b6967ab36a8b6bd39e.exe

    • Size

      298KB

    • MD5

      3e9007a477dd81264659889b9e245c8d

    • SHA1

      7d784a4b63b95f2330217b88e8b1d53b54533ffd

    • SHA256

      72905a621da6ddc614abf5385b2279779b556792400406b6967ab36a8b6bd39e

    • SHA512

      2438eab27f992c71fa9379dcf012ad89db79e1c79f92fd32f384c27644891b77ef1be5bec96021a3a44dcbc75085bb8425cf25d8cd80d6dca1e04b361a44a411

    • SSDEEP

      3072:InFK9onOjbJ2QAsSdADRq6ty71wtYM77ldY7AXTp2kA3:IFK9bJuwH77Ppj0kA

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks