General

  • Target

    52d778b6b7e3115d0746bd1aef233cb7d97c8a2f018de80cd37bfefc0388a4c6

  • Size

    76KB

  • Sample

    241113-12yp3a1akr

  • MD5

    ecb15e11ca93f8beac14543492407f4f

  • SHA1

    a47d421585ec1da07d32e0d8101829fcbd300bc1

  • SHA256

    52d778b6b7e3115d0746bd1aef233cb7d97c8a2f018de80cd37bfefc0388a4c6

  • SHA512

    59f3dee42563a4f41e24dfff6c51df55f73610b16065cb35734a798c2942a5c06e6c161ad9063e800d917401939313709113ad1326cb7f669a99e7e7cd9f027f

  • SSDEEP

    1536:Sx3GsLjPnIjCxAVqGePY06MJebCqfnQ2oA9FKg+6HOqMed69:2DnBA6PEMJebCMnK+FZONl9

Malware Config

Extracted

Family

xworm

C2

realark.net:5235

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      52d778b6b7e3115d0746bd1aef233cb7d97c8a2f018de80cd37bfefc0388a4c6

    • Size

      76KB

    • MD5

      ecb15e11ca93f8beac14543492407f4f

    • SHA1

      a47d421585ec1da07d32e0d8101829fcbd300bc1

    • SHA256

      52d778b6b7e3115d0746bd1aef233cb7d97c8a2f018de80cd37bfefc0388a4c6

    • SHA512

      59f3dee42563a4f41e24dfff6c51df55f73610b16065cb35734a798c2942a5c06e6c161ad9063e800d917401939313709113ad1326cb7f669a99e7e7cd9f027f

    • SSDEEP

      1536:Sx3GsLjPnIjCxAVqGePY06MJebCqfnQ2oA9FKg+6HOqMed69:2DnBA6PEMJebCMnK+FZONl9

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks