General

  • Target

    BootStrapper.bat

  • Size

    302KB

  • Sample

    241103-gcgkpsyrgq

  • MD5

    e11a5d978c9f06cc301c8c44e52b4852

  • SHA1

    831ba9abea94b996c532cdada5a79bba72a391e3

  • SHA256

    d2d4ad73e3e1247c5dfa633aac6ca6e7bf0de3d0205790309759798e4bee062f

  • SHA512

    f0bcd0f568f52d2519c62486ed9b94a342ee5fcd7d52835cb5d0377a1ac8b178d8ae0bd04675dd01778291b6f36807a1c27e88497c7344e15d23fdbe792349f2

  • SSDEEP

    6144:U6j7gPgcFREzUgq4RgFmRYMkj/qUxD1p0/vb4YfrVTZJEdtnUNN4tK:rexEAglRetVf0/FfpPQnUNoK

Malware Config

Extracted

Family

xworm

C2

where-reverse.gl.at.ply.gg:9999

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Helper.exe

Targets

    • Target

      BootStrapper.bat

    • Size

      302KB

    • MD5

      e11a5d978c9f06cc301c8c44e52b4852

    • SHA1

      831ba9abea94b996c532cdada5a79bba72a391e3

    • SHA256

      d2d4ad73e3e1247c5dfa633aac6ca6e7bf0de3d0205790309759798e4bee062f

    • SHA512

      f0bcd0f568f52d2519c62486ed9b94a342ee5fcd7d52835cb5d0377a1ac8b178d8ae0bd04675dd01778291b6f36807a1c27e88497c7344e15d23fdbe792349f2

    • SSDEEP

      6144:U6j7gPgcFREzUgq4RgFmRYMkj/qUxD1p0/vb4YfrVTZJEdtnUNN4tK:rexEAglRetVf0/FfpPQnUNoK

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks