General

  • Target

    8327399d458913b2f8b9b8d5b53d38390ba01842747eb701cc75486e57df1d30N

  • Size

    70KB

  • Sample

    241110-pvvt2szmgr

  • MD5

    01417d75f6d4f4e43ab50301bdfed600

  • SHA1

    f71eb0c0c8e43f82338f2ea45b41a434836f77c4

  • SHA256

    8327399d458913b2f8b9b8d5b53d38390ba01842747eb701cc75486e57df1d30

  • SHA512

    3ae6831b2aa620f262f2d7c23194b66cb52eccbd955ee8f2b5ce7cfd3e53f85070000f98a301ec67f4f0426284bd5fdf0c135533fe3c041493781dac91cbe6ac

  • SSDEEP

    1536:ujXe7voXuNLagsO7hdXvxY+CbTX9R6l4OAy8AjubP:E6wXuNLagsO1dpY+CbTtNOB8AQP

Malware Config

Extracted

Family

xworm

C2

192.168.0.3:3389

184.190.169.22:3389

192.168.0.8:3389

192.168.0.7:3389

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Microsoft OneDrive.exe

Targets

    • Target

      8327399d458913b2f8b9b8d5b53d38390ba01842747eb701cc75486e57df1d30N

    • Size

      70KB

    • MD5

      01417d75f6d4f4e43ab50301bdfed600

    • SHA1

      f71eb0c0c8e43f82338f2ea45b41a434836f77c4

    • SHA256

      8327399d458913b2f8b9b8d5b53d38390ba01842747eb701cc75486e57df1d30

    • SHA512

      3ae6831b2aa620f262f2d7c23194b66cb52eccbd955ee8f2b5ce7cfd3e53f85070000f98a301ec67f4f0426284bd5fdf0c135533fe3c041493781dac91cbe6ac

    • SSDEEP

      1536:ujXe7voXuNLagsO7hdXvxY+CbTX9R6l4OAy8AjubP:E6wXuNLagsO1dpY+CbTtNOB8AQP

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks