General

  • Target

    d24b11e0094921a74e6342cc94e1c6a2f8bcfac2c4ad740207978e3d9da14cf2N

  • Size

    196KB

  • Sample

    241109-k97d6s1lez

  • MD5

    f9b5e75d1355cfcf2191ffec04ea1d30

  • SHA1

    3d4e91c29d5bfa2c47b7e7dc481a4be89b6ac207

  • SHA256

    d24b11e0094921a74e6342cc94e1c6a2f8bcfac2c4ad740207978e3d9da14cf2

  • SHA512

    73e671094f0a3e1060065f76234855a51ebe5b90a578c94ceee0eb669f98aae355236444d6c7b9ea3ada292a876861205ffc2a59794acd75a845de8fddecd9d4

  • SSDEEP

    3072:UTQjpvqkb20fGbVy3OeMUKRUGKXs+S++7KFSbxeY+qDDrMB:Uc1pbPfGn+GqStKEbxI

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    Microsoft Edge.exe

  • pastebin_url

    https://pastebin.com/raw/DKus0sZv

Targets

    • Target

      d24b11e0094921a74e6342cc94e1c6a2f8bcfac2c4ad740207978e3d9da14cf2N

    • Size

      196KB

    • MD5

      f9b5e75d1355cfcf2191ffec04ea1d30

    • SHA1

      3d4e91c29d5bfa2c47b7e7dc481a4be89b6ac207

    • SHA256

      d24b11e0094921a74e6342cc94e1c6a2f8bcfac2c4ad740207978e3d9da14cf2

    • SHA512

      73e671094f0a3e1060065f76234855a51ebe5b90a578c94ceee0eb669f98aae355236444d6c7b9ea3ada292a876861205ffc2a59794acd75a845de8fddecd9d4

    • SSDEEP

      3072:UTQjpvqkb20fGbVy3OeMUKRUGKXs+S++7KFSbxeY+qDDrMB:Uc1pbPfGn+GqStKEbxI

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks