General

  • Target

    Discord.exe

  • Size

    923KB

  • Sample

    241116-3dkjmswemq

  • MD5

    dde9c5a240d1467bbeb73bf9800e2451

  • SHA1

    84da3914545cbca748465892deb5c45fe7849ddf

  • SHA256

    af652fa448221ed08ba75eb68ad1ba894e4d3bafdbfa4569eef4704fd14c76c7

  • SHA512

    ce85de90686c7e64fe90201428993c02461729428a48937961ea6fc09fc7e5e65b13acdeaae54cbdd65ebdf5b93e769ef16020d96094ca498e1699a91c240e77

  • SSDEEP

    12288:RiuHvJKVze1rxIH8P2ttPfDBQW6dmlgNlHDCJ9dZay:pPJKzyoUctPLGW6dmlgNljCr1

Malware Config

Extracted

Family

xworm

C2

45.141.27.91:7777

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      Discord.exe

    • Size

      923KB

    • MD5

      dde9c5a240d1467bbeb73bf9800e2451

    • SHA1

      84da3914545cbca748465892deb5c45fe7849ddf

    • SHA256

      af652fa448221ed08ba75eb68ad1ba894e4d3bafdbfa4569eef4704fd14c76c7

    • SHA512

      ce85de90686c7e64fe90201428993c02461729428a48937961ea6fc09fc7e5e65b13acdeaae54cbdd65ebdf5b93e769ef16020d96094ca498e1699a91c240e77

    • SSDEEP

      12288:RiuHvJKVze1rxIH8P2ttPfDBQW6dmlgNlHDCJ9dZay:pPJKzyoUctPLGW6dmlgNljCr1

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks