General

  • Target

    a4a812445d1364563e7c1e852f23319514bba1e5ac38e3386bc77acda6f3ec51.zip

  • Size

    7.7MB

  • Sample

    241105-enqxeavdqk

  • MD5

    90fe88837d68c504b2ba4fa1e36f23fa

  • SHA1

    97c1874be635b8a497a6ab2113a7f262ae5b6a3f

  • SHA256

    a4a812445d1364563e7c1e852f23319514bba1e5ac38e3386bc77acda6f3ec51

  • SHA512

    debc2a6223a10c408e230a2f4b5e7438da5da8516b5e0a924451630ac16ae397778ad7faa72293d2f7959a6144347e324dfbbde73d3bb2f9c396060f3f2a8f72

  • SSDEEP

    196608:SSxH7QBjr68Y/tqN1OgspyvSvmdQem2wKyi1BGDM0qDVUb:SSxoY/tqbEQaYEDMBUb

Malware Config

Extracted

Family

xworm

Version

5.0

C2

109.206.246.102:3387

Mutex

MlpCbb9Z3AhhmnSA

Attributes
  • Install_directory

    %AppData%

  • install_file

    骇客开发.exe

aes.plain

Targets

    • Target

      dist/sdfysdfa.exe

    • Size

      7.6MB

    • MD5

      072e4116922c55a0acb83c6d7dbbb8e6

    • SHA1

      22c700bbddfecd3e0a157fc2182f1f62cb64f96b

    • SHA256

      f6199b227874bd24a02cfdead551441aebb9b6284aace5ffa9665db7b7651c92

    • SHA512

      8d6dce2a006dc4435443f5ca8b91257246b123fce3cbae9d2b3fa3cec8306aafa8314f2918569c2694c8429706a2e56133eeb1c773882b6f3eb0b3300356c3d6

    • SSDEEP

      196608:TQJY0aVhTDfyGR21X5Sp6GemDMPwQaYWhSiMRVA:qY0aVBDfDspfaMPgS1A

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks