General

  • Target

    18d6cb03aaa51e60509d37c28b01d36cfb9dc27cbf3824a194096756a779cf7bN

  • Size

    564KB

  • Sample

    241103-aflkhazblj

  • MD5

    31e2c53b5bf4d2dbb52412efbfc8bf00

  • SHA1

    4cd7735b817535352add043aae894473976af918

  • SHA256

    18d6cb03aaa51e60509d37c28b01d36cfb9dc27cbf3824a194096756a779cf7b

  • SHA512

    76acdfab2ff25ec3d52ab30357c55d35977af12057363638e1da614dc8584c4282482e7bad37620894c4349ef921947f34fb44b53531b5c5deea57aa1056ca76

  • SSDEEP

    12288:2AYaDPw1Qk89Tmyd+rCiw9DWTXnrCCcVXVz4klvTkR:2+Lw9gTFoQKLVcJ4klO

Malware Config

Extracted

Family

xworm

Version

3.1

C2

aye2mar280502016.ddns.net:4030

Mutex

6Ramn2bVtVXcTWn8

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      18d6cb03aaa51e60509d37c28b01d36cfb9dc27cbf3824a194096756a779cf7bN

    • Size

      564KB

    • MD5

      31e2c53b5bf4d2dbb52412efbfc8bf00

    • SHA1

      4cd7735b817535352add043aae894473976af918

    • SHA256

      18d6cb03aaa51e60509d37c28b01d36cfb9dc27cbf3824a194096756a779cf7b

    • SHA512

      76acdfab2ff25ec3d52ab30357c55d35977af12057363638e1da614dc8584c4282482e7bad37620894c4349ef921947f34fb44b53531b5c5deea57aa1056ca76

    • SSDEEP

      12288:2AYaDPw1Qk89Tmyd+rCiw9DWTXnrCCcVXVz4klvTkR:2+Lw9gTFoQKLVcJ4klO

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks