General

  • Target

    notepad.exe

  • Size

    940KB

  • Sample

    241101-vvj1favkgm

  • MD5

    8e1d6f39c7bcff12d78528e53b0d56a0

  • SHA1

    e323e0b2ab6c702fa4fbc3d0d5a982923f57e01e

  • SHA256

    ed851895646a795f0b55f5d471152af031987888c3c811c54cc9f12bf5e37643

  • SHA512

    6d408c00a885ee573af234202819c12e7d2beb33bdf5fef3ca7a7f9c59dd6bb245bdfa31266ffd541c87e1d772d8016343287ae7869c59861f83b9d1d0db0814

  • SSDEEP

    12288:BiZJnL+akG3+rgF4SqffBhWaRtWWoYMQ1v5l7+I1uIf5GpX:BUnPkG0B8aRrzM6OI1x5GJ

Malware Config

Extracted

Family

xworm

C2

83.38.28.117:1603

83.38.24.1:1603

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Runtime Broker.exe

Targets

    • Target

      notepad.exe

    • Size

      940KB

    • MD5

      8e1d6f39c7bcff12d78528e53b0d56a0

    • SHA1

      e323e0b2ab6c702fa4fbc3d0d5a982923f57e01e

    • SHA256

      ed851895646a795f0b55f5d471152af031987888c3c811c54cc9f12bf5e37643

    • SHA512

      6d408c00a885ee573af234202819c12e7d2beb33bdf5fef3ca7a7f9c59dd6bb245bdfa31266ffd541c87e1d772d8016343287ae7869c59861f83b9d1d0db0814

    • SSDEEP

      12288:BiZJnL+akG3+rgF4SqffBhWaRtWWoYMQ1v5l7+I1uIf5GpX:BUnPkG0B8aRrzM6OI1x5GJ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks