Resubmissions

16-11-2024 03:38

241116-d7cnfsylhx 10

16-11-2024 03:34

241116-d46r5aylfy 10

General

  • Target

    Calesial.exe

  • Size

    167KB

  • Sample

    241116-d7cnfsylhx

  • MD5

    dc87a72941b6080c4734c0c5d1ddd639

  • SHA1

    2c28fcaf49352ed9eeb39137c1157831d3f4bb14

  • SHA256

    adab3bc3b5ff06815461229d47960f67233e74a6e7771b80849956d8a1f3f603

  • SHA512

    122e2dc75d332b507c0f33cc8a1726b475bc6552279b1a64acba55b939ac8c3760933b13f46842096c23a5d604bc2af1bf2dc3dc224ebc8ea8db8f2eefd92e9f

  • SSDEEP

    3072:BAFLeHHWR38aZWbVQSobUzLOD57uvBz65/M6If+3Js+3JFkKeTnX:qlBWbmSbvxBt25

Malware Config

Extracted

Family

xworm

C2

forums-advancement.gl.at.ply.gg:58291

Attributes
  • Install_directory

    %Temp%

  • install_file

    1336ffb22842d595e7ee3602982.exe

Targets

    • Target

      Calesial.exe

    • Size

      167KB

    • MD5

      dc87a72941b6080c4734c0c5d1ddd639

    • SHA1

      2c28fcaf49352ed9eeb39137c1157831d3f4bb14

    • SHA256

      adab3bc3b5ff06815461229d47960f67233e74a6e7771b80849956d8a1f3f603

    • SHA512

      122e2dc75d332b507c0f33cc8a1726b475bc6552279b1a64acba55b939ac8c3760933b13f46842096c23a5d604bc2af1bf2dc3dc224ebc8ea8db8f2eefd92e9f

    • SSDEEP

      3072:BAFLeHHWR38aZWbVQSobUzLOD57uvBz65/M6If+3Js+3JFkKeTnX:qlBWbmSbvxBt25

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks