General

  • Target

    066ea1397f09fed558600e6c4bc7c1e4.bin

  • Size

    459KB

  • Sample

    241108-bcyaka1grq

  • MD5

    2b909f0df0aadd2f76e77c6beb26006a

  • SHA1

    c71c2380b7ae39756664bfb97253bcd5ea98c11b

  • SHA256

    59129c41eeabcc689986b80f9e4f6334a72b6557b0d56d0d185f803e26f4b6c4

  • SHA512

    4cfedd521aebfa23e283c8eef49c2429e766aebb58567fa7d29c42bd7adb28ceb8fd068e739eb1334cab879daf38647b703418116802bc2a4057bc9bf5abf211

  • SSDEEP

    12288:4fCsMVFPn2r/b/Kr6ixVwVMLUudI8zyRtF+hKQ8YaRV0:4fCsMVNnaj66qKoVdI0yd8KQQk

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

SF5USQEmssTrQl4w

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/4iZFGLTi

aes.plain

Targets

    • Target

      295a1fe5ff733dde577267491fa637a43dfb21930c60e996121eeec21d98d528.exe

    • Size

      564KB

    • MD5

      066ea1397f09fed558600e6c4bc7c1e4

    • SHA1

      059f84529641a772f564f0afa890fd4260ec3a06

    • SHA256

      295a1fe5ff733dde577267491fa637a43dfb21930c60e996121eeec21d98d528

    • SHA512

      d9a494a860ab21f59b405c48343a805f792ed14a9b915decdad3295779f7fb31ab84812a71c99d66838c8c82b37e826f2d66ed9dbfedac0b895e06c9eb8f7fdd

    • SSDEEP

      12288:4oSoGX2ry3mFpqjgS+CLuE0Fq7qUckNxxA7WkR:RSoGmr8mFpq8SjLuS7qjkNK

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks