General

  • Target

    Windows Shell Experience Host.exe

  • Size

    86KB

  • Sample

    241113-raryrsshqe

  • MD5

    17f122079462e212871a1e2eb20eaff9

  • SHA1

    349e4b54323acce835916a2bbe40dc9c5d30931f

  • SHA256

    f483197df60b8767d23fa820efaab0c6bcc3a4b02ebee3c8f1290ef699f6697e

  • SHA512

    95548cb30e9e45c4024be181253200d2188b622754158f6268fa09e41327dbb8468399a1b5ddd9d868413638bf1b9b18f6814586530f2c6a0a6cbd6311234e94

  • SSDEEP

    768:NG9nICDiZGhCMhOB0s1SbiFG9Ox7h86BOMhUL02dC+IHZK:NgICDiZQRhVeFG9e7h86BOM+Nd6c

Malware Config

Extracted

Family

xworm

Version

5.0

C2

147.185.221.20:65300

Mutex

RMe1pa1UgjNcB2Un

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Shell Experience Host.exe

aes.plain

Targets

    • Target

      Windows Shell Experience Host.exe

    • Size

      86KB

    • MD5

      17f122079462e212871a1e2eb20eaff9

    • SHA1

      349e4b54323acce835916a2bbe40dc9c5d30931f

    • SHA256

      f483197df60b8767d23fa820efaab0c6bcc3a4b02ebee3c8f1290ef699f6697e

    • SHA512

      95548cb30e9e45c4024be181253200d2188b622754158f6268fa09e41327dbb8468399a1b5ddd9d868413638bf1b9b18f6814586530f2c6a0a6cbd6311234e94

    • SSDEEP

      768:NG9nICDiZGhCMhOB0s1SbiFG9Ox7h86BOMhUL02dC+IHZK:NgICDiZQRhVeFG9e7h86BOM+Nd6c

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks