General

  • Target

    Windows10Upgrade9252.exe

  • Size

    3.2MB

  • Sample

    241112-y3t26ayrgw

  • MD5

    c0b25def4312fbddbcc4f01c6c0f5ba6

  • SHA1

    8d16a183d61233e7d6b6af7b3cafc6645ac2acb1

  • SHA256

    c0424d0ae06ca1e6e0249b40d33ac40d74075856d543ec0924884664fba52b79

  • SHA512

    8c67619747bb108dae5661688ec8fa4c62bc6ac38ee6ff14a4691aab04d7ddd870fee4262cb30624a6bd85ac1f7595af05311496b0336f979e7e5f797791bc0e

  • SSDEEP

    98304:GgjXlctych4cCzJ8k2omX8sUf0ht5f/LyXtcH/:JjKtych9CzJqXM32jyX

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:15304

parents-hundred.gl.at.ply.gg:15304

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    dllhost.exe

Targets

    • Target

      Windows10Upgrade9252.exe

    • Size

      3.2MB

    • MD5

      c0b25def4312fbddbcc4f01c6c0f5ba6

    • SHA1

      8d16a183d61233e7d6b6af7b3cafc6645ac2acb1

    • SHA256

      c0424d0ae06ca1e6e0249b40d33ac40d74075856d543ec0924884664fba52b79

    • SHA512

      8c67619747bb108dae5661688ec8fa4c62bc6ac38ee6ff14a4691aab04d7ddd870fee4262cb30624a6bd85ac1f7595af05311496b0336f979e7e5f797791bc0e

    • SSDEEP

      98304:GgjXlctych4cCzJ8k2omX8sUf0ht5f/LyXtcH/:JjKtych9CzJqXM32jyX

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks