General

  • Target

    NitroGen.exe

  • Size

    244KB

  • Sample

    241110-1d6qrsvhnn

  • MD5

    ba199a53400605e0dddec76f0bbb5d4f

  • SHA1

    81182bc28677dd07a8731d196244fb9643bde827

  • SHA256

    f273e967b289bf3c275aae486b8a49918a136c332fce84986417aac2f65d3a6a

  • SHA512

    578b6ac9bad24da3811239c8346e7d8fd33e2e3b1a322dddb829ce6336b5683421913f4dc8a12190d404ac8aa86129458b6ff3c24911a54986a485a61da815eb

  • SSDEEP

    1536:Grae78zjORCDGwfdCSog01313Rys5gCqbReEi0j+Rf21D2k:+ahKyd2n31F53/EAM2k

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/mDSLGN9q

  • telegram

    https://api.telegram.org/bot7168105056:AAGVK3B7ZFupxq4PpmnBpxAQOwJ5CUp76ow/sendMessage?chat_id=1992635040

Targets

    • Target

      NitroGen.exe

    • Size

      244KB

    • MD5

      ba199a53400605e0dddec76f0bbb5d4f

    • SHA1

      81182bc28677dd07a8731d196244fb9643bde827

    • SHA256

      f273e967b289bf3c275aae486b8a49918a136c332fce84986417aac2f65d3a6a

    • SHA512

      578b6ac9bad24da3811239c8346e7d8fd33e2e3b1a322dddb829ce6336b5683421913f4dc8a12190d404ac8aa86129458b6ff3c24911a54986a485a61da815eb

    • SSDEEP

      1536:Grae78zjORCDGwfdCSog01313Rys5gCqbReEi0j+Rf21D2k:+ahKyd2n31F53/EAM2k

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks