General

  • Target

    Setup.bat

  • Size

    492KB

  • Sample

    241112-d2n5asxjhn

  • MD5

    334e5ed791deb37c6838e954fda616d9

  • SHA1

    45519a533eedb9a5489b219069725ee884d6a662

  • SHA256

    996e11e2c1ddbb5a16743fafa288e5f554cf31a295b5ff8e705af30fb690ef31

  • SHA512

    88bdeb6930b66a1b86264519441207c81955183dfb5ba58705aaf9fbc2fe258dc8f13b23424596d711090380834a1354a549443d08c31b925b7a0ee9204818fc

  • SSDEEP

    12288:TV1R5Ja3/QZfusZK3VX+1VbQLGwCvn0YGZdRksyp:jtoQ5ZGpIDwCvn0YQRkvp

Malware Config

Extracted

Family

xworm

C2

here-thinking.gl.at.ply.gg:50161

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    WindowsSecurity.exe

Targets

    • Target

      Setup.bat

    • Size

      492KB

    • MD5

      334e5ed791deb37c6838e954fda616d9

    • SHA1

      45519a533eedb9a5489b219069725ee884d6a662

    • SHA256

      996e11e2c1ddbb5a16743fafa288e5f554cf31a295b5ff8e705af30fb690ef31

    • SHA512

      88bdeb6930b66a1b86264519441207c81955183dfb5ba58705aaf9fbc2fe258dc8f13b23424596d711090380834a1354a549443d08c31b925b7a0ee9204818fc

    • SSDEEP

      12288:TV1R5Ja3/QZfusZK3VX+1VbQLGwCvn0YGZdRksyp:jtoQ5ZGpIDwCvn0YQRkvp

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks