General

  • Target

    b7df6d57fa0d03e8b88e410b7e3f9e9b2a3f1ea1ed7da20772b5ac891901b973.exe

  • Size

    948KB

  • Sample

    241113-dbzs4svjax

  • MD5

    f42ead56b96d1ba327e85589ef129525

  • SHA1

    57a14d971e918a2f0cdf9c7de2d58f7f0735fa27

  • SHA256

    b7df6d57fa0d03e8b88e410b7e3f9e9b2a3f1ea1ed7da20772b5ac891901b973

  • SHA512

    d3f39ac55320356472ea2f9c94633463c48da6f7691d6362eb35501ef9a6e764ad0e67c7177383e074750e4af426d2b20d8e3f751e6369984bf33ea6872af0f0

  • SSDEEP

    12288:H76xn0ce0nsDy0Q00QEA86GiuzOg7IPD6TbsdWcS/0w1ey2EcP1E4gLO:b6xnLnBmn86uzOg7IrYbyWRjeZxgL

Malware Config

Targets

    • Target

      b7df6d57fa0d03e8b88e410b7e3f9e9b2a3f1ea1ed7da20772b5ac891901b973.exe

    • Size

      948KB

    • MD5

      f42ead56b96d1ba327e85589ef129525

    • SHA1

      57a14d971e918a2f0cdf9c7de2d58f7f0735fa27

    • SHA256

      b7df6d57fa0d03e8b88e410b7e3f9e9b2a3f1ea1ed7da20772b5ac891901b973

    • SHA512

      d3f39ac55320356472ea2f9c94633463c48da6f7691d6362eb35501ef9a6e764ad0e67c7177383e074750e4af426d2b20d8e3f751e6369984bf33ea6872af0f0

    • SSDEEP

      12288:H76xn0ce0nsDy0Q00QEA86GiuzOg7IPD6TbsdWcS/0w1ey2EcP1E4gLO:b6xnLnBmn86uzOg7IrYbyWRjeZxgL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks