General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241104-12xg1ayerk

  • MD5

    79ffc2971311139926dae71b2547b8df

  • SHA1

    b1b20389f2c697fbdfb5e2266bbbcd66123afc48

  • SHA256

    1de126f753b1807dd01898ea6bd9e65c7f168358a4e450957e665d6b4b080c2b

  • SHA512

    f4b83509899487bfb39d7da9ee3e75f86e0d8c34f2bd61b03f27290c5625a58df384494cae0159d3025e48592453046603e0798707b8ec701623cf13de9c9865

  • SSDEEP

    98304:fmDjWM8JEEsZEEamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRho/+tJsozLQ9:fm0OmeNTfm/pf+xk4dWRNCLvik

Malware Config

Extracted

Family

xworm

Version

5.0

C2

ads-dsl.gl.at.ply.gg:48801

Mutex

d8L36voXlgWaKjBj

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Anti Virus.exe

aes.plain

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      79ffc2971311139926dae71b2547b8df

    • SHA1

      b1b20389f2c697fbdfb5e2266bbbcd66123afc48

    • SHA256

      1de126f753b1807dd01898ea6bd9e65c7f168358a4e450957e665d6b4b080c2b

    • SHA512

      f4b83509899487bfb39d7da9ee3e75f86e0d8c34f2bd61b03f27290c5625a58df384494cae0159d3025e48592453046603e0798707b8ec701623cf13de9c9865

    • SSDEEP

      98304:fmDjWM8JEEsZEEamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRho/+tJsozLQ9:fm0OmeNTfm/pf+xk4dWRNCLvik

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks