General

  • Target

    046dc61545c4ca911c25cfc844b3b00c.bin

  • Size

    426KB

  • Sample

    241116-bcrssazpbp

  • MD5

    590fdca913426110706fbed60039d34e

  • SHA1

    d4b581b2ffc2a35d736d0ce3b4d473702e1ba9f4

  • SHA256

    95f75183ae20ba58029f7a082b18ac082e36a0bac463c4e30ff1c5738afc3ca0

  • SHA512

    a505658bd9efdaffe26436e031c5e35021b393a81bbc6cebe507927166bc0738be45ae3c2778300b6978a015b494ccb7f10b8b6b9c36aaf3268581d6f3e3d475

  • SSDEEP

    6144:SwI5vJvu15weyfCFtpUbkm6tZlvawl3xeoXFkggPeOOqzHLSDq2Q942yq:vWJUKsU4m6DJTlHXFk0MzHLSD5Q9LX

Malware Config

Extracted

Family

xworm

Version

3.1

C2

pkaraven.duckdns.org:9387

Mutex

PN8dWiUH0oIhIHhD

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      edb8cc2548ed59dc491c0a1cb0b4907a2235b13bbe06a880053bbab544f91386.exe

    • Size

      528KB

    • MD5

      046dc61545c4ca911c25cfc844b3b00c

    • SHA1

      671cda72944c3920edb83520eb5d2317af0c60cb

    • SHA256

      edb8cc2548ed59dc491c0a1cb0b4907a2235b13bbe06a880053bbab544f91386

    • SHA512

      c8024a51ede593157cc7a881a8587536cf010c4c8f9838e44518371dbcec12e96fcac16742617eec414f6a280a5abbcf8d9fe3bcac9c04b75049006f2d93af6e

    • SSDEEP

      12288:5hU2ft8hWSxwvzeA5ScGZshgwnmnmalFYCJVM:bHfuWSxWRGgLmnmaQCJV

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks