General

  • Target

    Galleon.exe

  • Size

    114KB

  • Sample

    241116-wfpg2szmev

  • MD5

    732ad9a401dd2af8e78a23618312a5b1

  • SHA1

    e0efd569e5cf9ed522c8dc8e2e15fe30aaf17de8

  • SHA256

    cdecf958e0953e75493c8cf7ba2e347e34abb57a59baa659e1dc4aa61abcdb94

  • SHA512

    082d717b8f30849516e15d267f564bd3d285e031d8f6dec8d3943b15192b983f7acff96f7ccd19ba18fcb70b4502633d0f30a89ef8d0af53ad692ddb3f8596d0

  • SSDEEP

    3072:0kMOToQm4taqybIYUQXpchK35Qs6pMrzA7IoFO:PToQmrfpXprph1zk

Malware Config

Extracted

Family

xworm

C2

left-noon.gl.at.ply.gg:60705

Attributes
  • Install_directory

    %AppData%

  • install_file

    US11B.exe

Targets

    • Target

      Galleon.exe

    • Size

      114KB

    • MD5

      732ad9a401dd2af8e78a23618312a5b1

    • SHA1

      e0efd569e5cf9ed522c8dc8e2e15fe30aaf17de8

    • SHA256

      cdecf958e0953e75493c8cf7ba2e347e34abb57a59baa659e1dc4aa61abcdb94

    • SHA512

      082d717b8f30849516e15d267f564bd3d285e031d8f6dec8d3943b15192b983f7acff96f7ccd19ba18fcb70b4502633d0f30a89ef8d0af53ad692ddb3f8596d0

    • SSDEEP

      3072:0kMOToQm4taqybIYUQXpchK35Qs6pMrzA7IoFO:PToQmrfpXprph1zk

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks