General

  • Target

    1ade097499dd5fb334ffe69d06d00b31.bin

  • Size

    101KB

  • Sample

    241102-vqak7s1ann

  • MD5

    3275f275faff10b921b700db2348ce80

  • SHA1

    da4b3367957ae701632699ddb70394e731213f02

  • SHA256

    dd613b3cad5815102a816ec70b1518d413c7e2998be64a49eecd5f14b28d42ed

  • SHA512

    72fdd4297a62839f7d0a673bcf7f62c95719df553e1467f76acd547d67a58a6224caf68d62a5032975a2ca43156b76644ef3e81cd5c7333b0124b22938b5d0e9

  • SSDEEP

    3072:lHaVEoRaOTGza5oPM4kqd/EEukg2CDrXJor1quOhK:fQ7TYlRZukg2CDrXer1N

Malware Config

Extracted

Family

xworm

C2

topics-junior.at.ply.gg:45283

Attributes
  • Install_directory

    %AppData%

  • install_file

    msedge.exe

Targets

    • Target

      fa5a74ef1355ddd1d5984b84d52d7aa0727e11e40a89ca3a2bbf4594eea57730.exe

    • Size

      158KB

    • MD5

      1ade097499dd5fb334ffe69d06d00b31

    • SHA1

      ab5e0d3a2e0a71b2afe9a04bd24835a8f5874079

    • SHA256

      fa5a74ef1355ddd1d5984b84d52d7aa0727e11e40a89ca3a2bbf4594eea57730

    • SHA512

      b35aec83bbf5e0501a706df42db4db1b077acf88e37a4d6c65b52c83f24db0e0eb33fad9f22f0a847a14f6540419d85e24062f9c65a2a6d96db5ab20d315598e

    • SSDEEP

      3072:6vpWpop9+bNFwwO52HJe5BV0bUniyimyx:IVpkbEaJe5v0bURy

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks