General
-
Target
Midnight.exe
-
Size
73KB
-
Sample
241115-znp1bssbnp
-
MD5
af9ff800562a87e5121cad94adb74471
-
SHA1
ccadb2b20a7ee0cffeffed04e415ca131a7c41bc
-
SHA256
7bcff120e45739b923e684e9c246e4c650cdfe3e5fe51399cfba6bcf932bd246
-
SHA512
004d275549a7c0b8ba717a46c9a9b80ecc442db6dd868384a17ba797f1db8a64d6198317ffd28ca619c8fe3ffebb934eb9cb9b60486e8e5c79563206c9aaf892
-
SSDEEP
1536:q2H3hrFnT3fdHC0+aasbh0bkkNB/cxbRH6TTpH4ONThXiA:nXffdDznmbklxbCTpYOBhSA
Behavioral task
behavioral1
Sample
Midnight.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Midnight.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
127.0.0.1:56698
true-lung.gl.at.ply.gg:56698
-
Install_directory
%Userprofile%
-
install_file
svhost.exe
Targets
-
-
Target
Midnight.exe
-
Size
73KB
-
MD5
af9ff800562a87e5121cad94adb74471
-
SHA1
ccadb2b20a7ee0cffeffed04e415ca131a7c41bc
-
SHA256
7bcff120e45739b923e684e9c246e4c650cdfe3e5fe51399cfba6bcf932bd246
-
SHA512
004d275549a7c0b8ba717a46c9a9b80ecc442db6dd868384a17ba797f1db8a64d6198317ffd28ca619c8fe3ffebb934eb9cb9b60486e8e5c79563206c9aaf892
-
SSDEEP
1536:q2H3hrFnT3fdHC0+aasbh0bkkNB/cxbRH6TTpH4ONThXiA:nXffdDznmbklxbCTpYOBhSA
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1