General

  • Target

    295a1fe5ff733dde577267491fa637a43dfb21930c60e996121eeec21d98d528.exe

  • Size

    564KB

  • Sample

    241107-cn1eqsskcw

  • MD5

    066ea1397f09fed558600e6c4bc7c1e4

  • SHA1

    059f84529641a772f564f0afa890fd4260ec3a06

  • SHA256

    295a1fe5ff733dde577267491fa637a43dfb21930c60e996121eeec21d98d528

  • SHA512

    d9a494a860ab21f59b405c48343a805f792ed14a9b915decdad3295779f7fb31ab84812a71c99d66838c8c82b37e826f2d66ed9dbfedac0b895e06c9eb8f7fdd

  • SSDEEP

    12288:4oSoGX2ry3mFpqjgS+CLuE0Fq7qUckNxxA7WkR:RSoGmr8mFpq8SjLuS7qjkNK

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

SF5USQEmssTrQl4w

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/4iZFGLTi

aes.plain

Targets

    • Target

      295a1fe5ff733dde577267491fa637a43dfb21930c60e996121eeec21d98d528.exe

    • Size

      564KB

    • MD5

      066ea1397f09fed558600e6c4bc7c1e4

    • SHA1

      059f84529641a772f564f0afa890fd4260ec3a06

    • SHA256

      295a1fe5ff733dde577267491fa637a43dfb21930c60e996121eeec21d98d528

    • SHA512

      d9a494a860ab21f59b405c48343a805f792ed14a9b915decdad3295779f7fb31ab84812a71c99d66838c8c82b37e826f2d66ed9dbfedac0b895e06c9eb8f7fdd

    • SSDEEP

      12288:4oSoGX2ry3mFpqjgS+CLuE0Fq7qUckNxxA7WkR:RSoGmr8mFpq8SjLuS7qjkNK

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks