General

  • Target

    f7f52f6bbffa02fffcea30d5806050b7702a9a78dcbeae83e28c45d81aa1c4c4.exe

  • Size

    85.1MB

  • Sample

    241107-d4cjaatmgw

  • MD5

    8310bdf3ac82001830f75c15fba8cc15

  • SHA1

    581d729268cbd245d091633cc19692c4b5bfa0af

  • SHA256

    f7f52f6bbffa02fffcea30d5806050b7702a9a78dcbeae83e28c45d81aa1c4c4

  • SHA512

    ceab56619fa83baddcc3af7b781ce144ec53db919a6a80079b51e874d495e78349dc6882dad3f815c95274d8caca514765f34086f0b7acb8d42c616ca1714bf0

  • SSDEEP

    49152:kDSdqvdbLqSewjI63pCESb+7sQuJwomAiyHwjfUZo+JP0D73BB681fhojkIG1l0D:

Malware Config

Extracted

Family

xworm

C2

45.145.41.178:1111

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Defender Notification.exe

Targets

    • Target

      f7f52f6bbffa02fffcea30d5806050b7702a9a78dcbeae83e28c45d81aa1c4c4.exe

    • Size

      85.1MB

    • MD5

      8310bdf3ac82001830f75c15fba8cc15

    • SHA1

      581d729268cbd245d091633cc19692c4b5bfa0af

    • SHA256

      f7f52f6bbffa02fffcea30d5806050b7702a9a78dcbeae83e28c45d81aa1c4c4

    • SHA512

      ceab56619fa83baddcc3af7b781ce144ec53db919a6a80079b51e874d495e78349dc6882dad3f815c95274d8caca514765f34086f0b7acb8d42c616ca1714bf0

    • SSDEEP

      49152:kDSdqvdbLqSewjI63pCESb+7sQuJwomAiyHwjfUZo+JP0D73BB681fhojkIG1l0D:

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks