General

  • Target

    04ebe4c2a2397fd72ba719c24aae0a682f430dfcfd1487ef41d9a26d129323fd

  • Size

    440KB

  • Sample

    241106-nagagsyjhz

  • MD5

    49066ab2f037541899316720017224a5

  • SHA1

    92c1cf879956b72512532e0a3d1220bd21a00ecc

  • SHA256

    04ebe4c2a2397fd72ba719c24aae0a682f430dfcfd1487ef41d9a26d129323fd

  • SHA512

    ccfcde2f4258855a4729ca9234a4f9b4ff1c64d3da00a87457c7b3485ba2dc1f8dde8eed96d9d655da8adb6700df099d4991f8f94e894c857d23c526d806f655

  • SSDEEP

    12288:do3b//GgX/cZpe6ZQtxAA2MbmGP9DqtgNg5:doDl/cv8tKTMbmEQ5

Malware Config

Extracted

Family

xworm

Version

3.1

C2

45.149.241.217:7000

Mutex

ir8qgmTYaaTz9RIP

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      payment.exe

    • Size

      478KB

    • MD5

      1db8a24af26be22dfbdfa94f2557044b

    • SHA1

      7f6f8a15fe47b5ba205e5f09c82c80296ac57e4e

    • SHA256

      9ca715647dc7025d4ea21adc4a9eda922d8d8d17397d4751026397b4e44ec5b4

    • SHA512

      e0fa830452b183b252de64cbaa39abd65c7b8c24517694a618abbf0ea56bbed00bd417f84b2c29b350126a6e3c29582787c3eb7296816bb62554e8b83fbefc38

    • SSDEEP

      12288:T2PJbEeX/Se2Zu/ZAeJBcRMibOOASlCDkR:T2Px//SlWBcOibOOf

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks