General

  • Target

    https://cdn.discordapp.com/attachments/1269727972244455596/1301199340798476300/MEMORY_CODE_STEALER_FROM_EXE.exe?ex=672e27d1&is=672cd651&hm=c44e7e1e68603495d2e7f1c5da5b9c5faf33a804bda58ba00035a8edd087c185&

  • Sample

    241108-az4v7atpal

Malware Config

Extracted

Family

xworm

C2

147.185.221.21:27938

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot6575053517:AAHfQSqLTvzOajvn1QldlaGUVj-u9hK2upc/sendMessage?chat_id=7492036336

Targets

    • Target

      https://cdn.discordapp.com/attachments/1269727972244455596/1301199340798476300/MEMORY_CODE_STEALER_FROM_EXE.exe?ex=672e27d1&is=672cd651&hm=c44e7e1e68603495d2e7f1c5da5b9c5faf33a804bda58ba00035a8edd087c185&

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks for VirtualBox Guest Additions in registry

    • Downloads MZ/PE file

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks