General

  • Target

    3f3d33237e56d547df335c22816af3cde586a66e234e2ea6ea9ab5f90cb4b0a7

  • Size

    237KB

  • Sample

    241101-x8rcsavdjr

  • MD5

    ac4ef9a196e1fcbf046a1f357d1240a2

  • SHA1

    ab74bd5ef75aea3153da22dda211e08eb0a30c8b

  • SHA256

    3f3d33237e56d547df335c22816af3cde586a66e234e2ea6ea9ab5f90cb4b0a7

  • SHA512

    5c79ed5aad2ca76b1faab75f125d79b46db73ae78b76951d5edd199e3e1d874cdcc1e79e7f70aff362e6cea0b4561a9998daf8db7acb0ec921148a7790747369

  • SSDEEP

    3072:Uy+Geu6jTFr99QO/s3zLLAsNeDF5nI0PGIj9lua/Obw0hFv2PCWpIdk:UvPr9uzL0sNOBTunbw0/5Wp

Malware Config

Extracted

Family

xworm

Version

5.0

C2

enter-sierra.gl.at.ply.gg:55389

Mutex

lzS6Ul7Mo5UcN6CR

Attributes
  • Install_directory

    %AppData%

  • install_file

    Wave.exe

aes.plain

Targets

    • Target

      3f3d33237e56d547df335c22816af3cde586a66e234e2ea6ea9ab5f90cb4b0a7

    • Size

      237KB

    • MD5

      ac4ef9a196e1fcbf046a1f357d1240a2

    • SHA1

      ab74bd5ef75aea3153da22dda211e08eb0a30c8b

    • SHA256

      3f3d33237e56d547df335c22816af3cde586a66e234e2ea6ea9ab5f90cb4b0a7

    • SHA512

      5c79ed5aad2ca76b1faab75f125d79b46db73ae78b76951d5edd199e3e1d874cdcc1e79e7f70aff362e6cea0b4561a9998daf8db7acb0ec921148a7790747369

    • SSDEEP

      3072:Uy+Geu6jTFr99QO/s3zLLAsNeDF5nI0PGIj9lua/Obw0hFv2PCWpIdk:UvPr9uzL0sNOBTunbw0/5Wp

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks