General

  • Target

    scvhost.exe

  • Size

    42KB

  • Sample

    241102-xyq92asmd1

  • MD5

    4171f38c413ee527c699d6a124738bec

  • SHA1

    65db2ecf73416a1c75107ed0bdb40f9072033167

  • SHA256

    e1b83b2921ffbccb583adc624492872331f6e029c35c880b24940a4d8526c7dd

  • SHA512

    4f0752f5fa6b6b98948d5770b69501e8c5a5edac1cc25ef49ac904428fb178199d53aef92aa93411d88df60c3270188710f29a87e2e599b307bbfde943f2d0e7

  • SSDEEP

    768:eEGcr3BbT4UAd29etN8cuGgFFRPy9dN6TO5hiW5y:xTrR/RI9IF09dN6TO5kh

Malware Config

Extracted

Family

xworm

Version

5.0

C2

192.168.0.3:3389

184.190.169.22:3389

192.168.0.8:3389

192.168.0.7:3389

Mutex

wb34QNtoOY5wHRBe

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Microsoft OneDrive.exe

aes.plain

Targets

    • Target

      scvhost.exe

    • Size

      42KB

    • MD5

      4171f38c413ee527c699d6a124738bec

    • SHA1

      65db2ecf73416a1c75107ed0bdb40f9072033167

    • SHA256

      e1b83b2921ffbccb583adc624492872331f6e029c35c880b24940a4d8526c7dd

    • SHA512

      4f0752f5fa6b6b98948d5770b69501e8c5a5edac1cc25ef49ac904428fb178199d53aef92aa93411d88df60c3270188710f29a87e2e599b307bbfde943f2d0e7

    • SSDEEP

      768:eEGcr3BbT4UAd29etN8cuGgFFRPy9dN6TO5hiW5y:xTrR/RI9IF09dN6TO5kh

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks