General

  • Target

    https://cdn.discordapp.com/attachments/1305597877460008980/1305598799627948093/Psychos_Tools.exe?ex=67339d22&is=67324ba2&hm=1c1335f7534875cc8cd8ff1f421fcdf2677d43529ddb279e31517e575a125216&

  • Sample

    241111-w3dztssmdw

Malware Config

Extracted

Family

xworm

C2

person-bedford.gl.at.ply.gg:27900

147.185.221.23:27900

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=7538845070

Targets

    • Target

      https://cdn.discordapp.com/attachments/1305597877460008980/1305598799627948093/Psychos_Tools.exe?ex=67339d22&is=67324ba2&hm=1c1335f7534875cc8cd8ff1f421fcdf2677d43529ddb279e31517e575a125216&

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks