General

  • Target

    6d2e418121082257cd6ea8ea7adacae1723003d03bde9ea3c0c396e033892f66.exe

  • Size

    34KB

  • Sample

    241112-dcwsvatbnn

  • MD5

    121602c80204ce250c2bb4ba098c6e9c

  • SHA1

    e5547e67e3a0efd7611590785143443a23ec9c0c

  • SHA256

    6d2e418121082257cd6ea8ea7adacae1723003d03bde9ea3c0c396e033892f66

  • SHA512

    c96f8738b4e4ff1a3b2f83d77689d0d4429e26c44b5d64124fbea458d087704f28dc1960c45825a36f1c54c2ce997657d738d8be653f81c8e8d7cddd41588b09

  • SSDEEP

    768:AYBpz/QvWZqvoXu24OFrCxxF39XTp6LOjh/bUJ:AYBpz/QvwtbFGrF39XV6LOjN4J

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:26848

on-modules.gl.at.ply.gg:26848

Mutex

wrmsNSNXixl9dMEG

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      6d2e418121082257cd6ea8ea7adacae1723003d03bde9ea3c0c396e033892f66.exe

    • Size

      34KB

    • MD5

      121602c80204ce250c2bb4ba098c6e9c

    • SHA1

      e5547e67e3a0efd7611590785143443a23ec9c0c

    • SHA256

      6d2e418121082257cd6ea8ea7adacae1723003d03bde9ea3c0c396e033892f66

    • SHA512

      c96f8738b4e4ff1a3b2f83d77689d0d4429e26c44b5d64124fbea458d087704f28dc1960c45825a36f1c54c2ce997657d738d8be653f81c8e8d7cddd41588b09

    • SSDEEP

      768:AYBpz/QvWZqvoXu24OFrCxxF39XTp6LOjh/bUJ:AYBpz/QvwtbFGrF39XV6LOjN4J

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks