General

  • Target

    7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25

  • Size

    63KB

  • Sample

    241113-3lch1azre1

  • MD5

    754c64b6e93a932952e1d86b66213486

  • SHA1

    f23268af58f8b4758e1a98619fa4640139c88e99

  • SHA256

    7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25

  • SHA512

    16417885aaf1a72b4c58d9bb3e5bc1b55692ac9ad0d963397ac27f53c982aaf9a07d1efce8ab37479b73157b8bbb678f94bfeff5b0fc27d3784e5cdd1704555f

  • SSDEEP

    1536:jv0nbrF7oGDVxO13pmjLpgTC1Vsy9bAGS5bHIeS1Uc6WOTSXnTe:jvjCzO1UFky9bAGwjuyAOTKK

Malware Config

Extracted

Family

xworm

C2

146.190.110.91:3389

Attributes
  • Install_directory

    %AppData%

  • install_file

    smartscreen.exe

  • telegram

    https://api.telegram.org/bot8033290183:AAFGRm9tWSgOpPIATZ1BFGl9qpuLMlAya54/sendMessage?chat_id=8085766327

Targets

    • Target

      7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25

    • Size

      63KB

    • MD5

      754c64b6e93a932952e1d86b66213486

    • SHA1

      f23268af58f8b4758e1a98619fa4640139c88e99

    • SHA256

      7a8fe7d881adece62bb6057d8306d8a0d417a810a81882149587958bbf39ff25

    • SHA512

      16417885aaf1a72b4c58d9bb3e5bc1b55692ac9ad0d963397ac27f53c982aaf9a07d1efce8ab37479b73157b8bbb678f94bfeff5b0fc27d3784e5cdd1704555f

    • SSDEEP

      1536:jv0nbrF7oGDVxO13pmjLpgTC1Vsy9bAGS5bHIeS1Uc6WOTSXnTe:jvjCzO1UFky9bAGwjuyAOTKK

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks