General

  • Target

    Nursultan (2).rar

  • Size

    64KB

  • Sample

    241115-rbwckstrbz

  • MD5

    72f19f9be2548860b74de35487064b00

  • SHA1

    85e66d39df26444e7f412c4d13d347e809e15fae

  • SHA256

    d4d38f87de58a5245ab1a01a7e28df51f69e890ab05ebc67ede60bf59221c721

  • SHA512

    976cc5389224186d3fe83a754d9ae3e22afba97757a2711587bf578703e22b0524e4187698e0dd4d7e4f2affeebff3ab83164a3cebfc259a249e4d56fa03e058

  • SSDEEP

    1536:JTDcIp/Ib1bTxV36QPwGKFHR9fZ8CGUQnEqLeEYx0Gttcttttttttttttttttttt:JncIpgtmKwd/fBGUq00Gttcttttttttl

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:38492

warning-ms.gl.at.ply.gg:38492

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      Nursultan/Nurik.exe

    • Size

      93.0MB

    • MD5

      a7af4ea5482967126191e729140dfd4c

    • SHA1

      dbff744bbc2f7adfbe337f3fd700c50433301b2d

    • SHA256

      5cac4982836ceae3b8de591f5f469234c5e75dd5c90757279015ddd6b73251d6

    • SHA512

      4734bde77c6fe490589aeb7ac142fa293b59b09cda0226bc22b2c8928c2d4cd1ef47cab95d88a7618c9dd76fe482a346bd6dd2186dea7610e5697c3b46c32156

    • SSDEEP

      1536:OfeHtRfrimdNmkKZr311OGAiQj39IdcCqcAPh9KE:nHtRp6r311RAzj390VAPh9v

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks