General

  • Target

    210e2e98bf88e3dd17e8ac1b8bdef59cd8fd93dcc5c579bf3a59830b30bc9052

  • Size

    324KB

  • Sample

    241115-r228tayrhm

  • MD5

    610f78dab4043f4ab8d964e226d6edcb

  • SHA1

    383a33247a84f1e5a23334ea1a353d2e6aa7e855

  • SHA256

    210e2e98bf88e3dd17e8ac1b8bdef59cd8fd93dcc5c579bf3a59830b30bc9052

  • SHA512

    0303eeb10caa59274e75676b9f1ad4c5baa7455fb8e3cb4d0a856ecc7d02224931df6c90c18e87fb2cf4212e97f33fa088ba1ae6eb93d39439bee5fbc48e7861

  • SSDEEP

    3072:gA5ta1bMRRlOXk12l4mJe7UmuLchHPHo4bqRH33qGCNxxOe:xAbIMl4miUdLchvo4OlnqR

Malware Config

Extracted

Family

xworm

C2

23.ip.gl.ply.gg:40630

147.185.221.23:40630

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      210e2e98bf88e3dd17e8ac1b8bdef59cd8fd93dcc5c579bf3a59830b30bc9052

    • Size

      324KB

    • MD5

      610f78dab4043f4ab8d964e226d6edcb

    • SHA1

      383a33247a84f1e5a23334ea1a353d2e6aa7e855

    • SHA256

      210e2e98bf88e3dd17e8ac1b8bdef59cd8fd93dcc5c579bf3a59830b30bc9052

    • SHA512

      0303eeb10caa59274e75676b9f1ad4c5baa7455fb8e3cb4d0a856ecc7d02224931df6c90c18e87fb2cf4212e97f33fa088ba1ae6eb93d39439bee5fbc48e7861

    • SSDEEP

      3072:gA5ta1bMRRlOXk12l4mJe7UmuLchHPHo4bqRH33qGCNxxOe:xAbIMl4miUdLchvo4OlnqR

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks