General

  • Target

    3d25fe2989b3b9505c5b45751d1da232fe3715bff54c6900d82b99e7ad76e6c5N

  • Size

    114KB

  • Sample

    241111-v1pswawjcn

  • MD5

    e20b663922380d2a79b01883ba62e890

  • SHA1

    dd1a149b68a295548c0de33122efe0b04a202fd6

  • SHA256

    3d25fe2989b3b9505c5b45751d1da232fe3715bff54c6900d82b99e7ad76e6c5

  • SHA512

    187a06c21aa6f532ef6e1a46141d95a1aded62b3b9908789c85b57038e07357e64a92642f7ff25e7ea27bb00ab75f1756f8b68d1eb094cdbbe8f6f8b721bcac5

  • SSDEEP

    1536:JjYYfOtuaA3+pfbrp+ZY9QQK676lJOqVChiH0hLP+VVVVVVVVVVVVVVVVVVVVVVf:B0uaA3+pfbrpfOZfOqVbH0hLN0

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:10967

22.ip.gl.ply.gg:10967

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    dllhso.exe

Targets

    • Target

      3d25fe2989b3b9505c5b45751d1da232fe3715bff54c6900d82b99e7ad76e6c5N

    • Size

      114KB

    • MD5

      e20b663922380d2a79b01883ba62e890

    • SHA1

      dd1a149b68a295548c0de33122efe0b04a202fd6

    • SHA256

      3d25fe2989b3b9505c5b45751d1da232fe3715bff54c6900d82b99e7ad76e6c5

    • SHA512

      187a06c21aa6f532ef6e1a46141d95a1aded62b3b9908789c85b57038e07357e64a92642f7ff25e7ea27bb00ab75f1756f8b68d1eb094cdbbe8f6f8b721bcac5

    • SSDEEP

      1536:JjYYfOtuaA3+pfbrp+ZY9QQK676lJOqVChiH0hLP+VVVVVVVVVVVVVVVVVVVVVVf:B0uaA3+pfbrpfOZfOqVbH0hLN0

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks