Resubmissions

16-11-2024 03:48

241116-ec8cbatkgq 10

16-11-2024 03:48

241116-ecvffszdll 10

16-11-2024 03:45

241116-ea7b8stkfm 10

General

  • Target

    ApplicationFramHost.exe

  • Size

    77KB

  • Sample

    241116-ec8cbatkgq

  • MD5

    67c7fe1635180abaa9c88940d61bb20a

  • SHA1

    addc53c2291b8a3d17b3668600b8257fef496989

  • SHA256

    621278f6f2d263419d69187282d006e8f81afd73bdd75a39880d01d37bf0bbaf

  • SHA512

    9b19f62ea458345a5d2d7ebb4d22a413996b502619466b1d3eaed0f92b35af91650cddd9ffdb397f8ed4558a09c44ce424d344c1f4102543934b651d103c40fc

  • SSDEEP

    1536:u58tFnhxOx9v5vEv9t0bz9H2dhE6XDBO8YxHMQuhWy+R:i8tVh+vNEv9+bzmOvxHMLwbR

Malware Config

Extracted

Family

xworm

C2

forums-advancement.gl.at.ply.gg:58291

Attributes
  • Install_directory

    %Temp%

  • install_file

    1336ffb22842d595e7ee3602982.exe

Targets

    • Target

      ApplicationFramHost.exe

    • Size

      77KB

    • MD5

      67c7fe1635180abaa9c88940d61bb20a

    • SHA1

      addc53c2291b8a3d17b3668600b8257fef496989

    • SHA256

      621278f6f2d263419d69187282d006e8f81afd73bdd75a39880d01d37bf0bbaf

    • SHA512

      9b19f62ea458345a5d2d7ebb4d22a413996b502619466b1d3eaed0f92b35af91650cddd9ffdb397f8ed4558a09c44ce424d344c1f4102543934b651d103c40fc

    • SSDEEP

      1536:u58tFnhxOx9v5vEv9t0bz9H2dhE6XDBO8YxHMQuhWy+R:i8tVh+vNEv9+bzmOvxHMLwbR

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks