General

  • Target

    Realtek HD Audio Universal Service.exe

  • Size

    40KB

  • Sample

    241113-rcljrswpfq

  • MD5

    876020bf5050a2b498b45cb65d89f067

  • SHA1

    7f7ace329e3c77e14fc5bb11d1797e5f61f96859

  • SHA256

    9e2cc1e98ba3672218c8fbdeb5c8831c340a25c4b425ee32bf45527577c8eb2c

  • SHA512

    f168fe3bb22c1947036418737845c9200c5642fec69d24a982d47d2c0da9502e8e8e86268fae5c39f28ab8267fc4cb2644a9e27a4f8b898dfafd4c5b801fd7c0

  • SSDEEP

    768:MBj78fx6MooenBjJfDUbtRFH9OKl6BOMhXL05jh:o78p6MLeBjJfIbDFH93l6BOMFkjh

Malware Config

Extracted

Family

xworm

Version

5.0

C2

147.185.221.23:57069

Mutex

lW9cEvIRnaJBDeUt

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    Realtek HD Audio Universal Service.exe

aes.plain

Targets

    • Target

      Realtek HD Audio Universal Service.exe

    • Size

      40KB

    • MD5

      876020bf5050a2b498b45cb65d89f067

    • SHA1

      7f7ace329e3c77e14fc5bb11d1797e5f61f96859

    • SHA256

      9e2cc1e98ba3672218c8fbdeb5c8831c340a25c4b425ee32bf45527577c8eb2c

    • SHA512

      f168fe3bb22c1947036418737845c9200c5642fec69d24a982d47d2c0da9502e8e8e86268fae5c39f28ab8267fc4cb2644a9e27a4f8b898dfafd4c5b801fd7c0

    • SSDEEP

      768:MBj78fx6MooenBjJfDUbtRFH9OKl6BOMhXL05jh:o78p6MLeBjJfIbDFH93l6BOMFkjh

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks