General

  • Target

    edb8cc2548ed59dc491c0a1cb0b4907a2235b13bbe06a880053bbab544f91386.zip

  • Size

    426KB

  • Sample

    241114-rh8lgszhlh

  • MD5

    7c513924abf01cd80b3d099c4acbff09

  • SHA1

    3828221afef8742a56e81522dbeec77d8df885be

  • SHA256

    7cad3e5d2d0e3da754ed20cd1998e9c0de71b0c414cd55d301924105454c8f86

  • SHA512

    feac6d11545e1442a99709c556214c4ef58fe3ce826b466f0a4a0b6f476017dbdc45f145bd601ba6baad47d5286d87cb19e95097498c96bb42e7df1a2c4e6898

  • SSDEEP

    12288:TbK1yTUv9M7+cpRVbOVcqRPYsGs/k88ddtyuj9eWUR:TMyI1M7F5OmqappTtuWm

Malware Config

Extracted

Family

xworm

Version

3.1

C2

pkaraven.duckdns.org:9387

Mutex

PN8dWiUH0oIhIHhD

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      edb8cc2548ed59dc491c0a1cb0b4907a2235b13bbe06a880053bbab544f91386.exe

    • Size

      528KB

    • MD5

      046dc61545c4ca911c25cfc844b3b00c

    • SHA1

      671cda72944c3920edb83520eb5d2317af0c60cb

    • SHA256

      edb8cc2548ed59dc491c0a1cb0b4907a2235b13bbe06a880053bbab544f91386

    • SHA512

      c8024a51ede593157cc7a881a8587536cf010c4c8f9838e44518371dbcec12e96fcac16742617eec414f6a280a5abbcf8d9fe3bcac9c04b75049006f2d93af6e

    • SSDEEP

      12288:5hU2ft8hWSxwvzeA5ScGZshgwnmnmalFYCJVM:bHfuWSxWRGgLmnmaQCJV

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks