General

  • Target

    99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861

  • Size

    7.9MB

  • Sample

    241104-wbzgfswrfm

  • MD5

    626b15a696ab0909a6a2f73bc50d1f9b

  • SHA1

    0e7f8f49236828da8586d5d779e46e454509e80f

  • SHA256

    99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861

  • SHA512

    56c6feb457e1894a6dd4b79cb19acc62036203be58c588bf09e88c359a5346b909a538112053ca42f2301b04a9bcc1ea02e3d77b7ebc484b80523879a0b2fd03

  • SSDEEP

    196608:mLO9Y0aVhTDfyGR21X5Sp6GemDMPwQaYWhSiMRVA:39Y0aVBDfDspfaMPgS1A

Malware Config

Extracted

Family

xworm

Version

5.0

C2

109.206.246.102:3387

Mutex

MlpCbb9Z3AhhmnSA

Attributes
  • Install_directory

    %AppData%

  • install_file

    骇客开发.exe

aes.plain

Targets

    • Target

      99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861

    • Size

      7.9MB

    • MD5

      626b15a696ab0909a6a2f73bc50d1f9b

    • SHA1

      0e7f8f49236828da8586d5d779e46e454509e80f

    • SHA256

      99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861

    • SHA512

      56c6feb457e1894a6dd4b79cb19acc62036203be58c588bf09e88c359a5346b909a538112053ca42f2301b04a9bcc1ea02e3d77b7ebc484b80523879a0b2fd03

    • SSDEEP

      196608:mLO9Y0aVhTDfyGR21X5Sp6GemDMPwQaYWhSiMRVA:39Y0aVBDfDspfaMPgS1A

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks