General

  • Target

    SolaraBootstrapper.exe

  • Size

    279KB

  • Sample

    241112-mlf87a1bjk

  • MD5

    580dd32c33bf5ec13692dc160b2a3a98

  • SHA1

    8ba0d7dc695d75801a6169ab9b41130a3b305595

  • SHA256

    e2360b23a592c13f932142f87605559201de852fdbd1ba9ca218e4d7a04e45b8

  • SHA512

    7bfbe253971aeab2271fdda1e04f6cdd91e0166da51502ff509f794b4e97cfd0637d8ce2cc64e3b28cdde610032c69bb5f07d244f1cb848f178fd0dd3aacdf3b

  • SSDEEP

    3072:zn+bNARnVa9+be16ZDOYUxiLvAzII9x66AOag74srxxVfPWKvQIFY623:NRzbDyzqONxTGqQI+62

Malware Config

Extracted

Family

xworm

C2

22.ip.gl.ply.gg:5299

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      279KB

    • MD5

      580dd32c33bf5ec13692dc160b2a3a98

    • SHA1

      8ba0d7dc695d75801a6169ab9b41130a3b305595

    • SHA256

      e2360b23a592c13f932142f87605559201de852fdbd1ba9ca218e4d7a04e45b8

    • SHA512

      7bfbe253971aeab2271fdda1e04f6cdd91e0166da51502ff509f794b4e97cfd0637d8ce2cc64e3b28cdde610032c69bb5f07d244f1cb848f178fd0dd3aacdf3b

    • SSDEEP

      3072:zn+bNARnVa9+be16ZDOYUxiLvAzII9x66AOag74srxxVfPWKvQIFY623:NRzbDyzqONxTGqQI+62

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks