General

  • Target

    af9ff800562a87e5121cad94adb74471.bin

  • Size

    45KB

  • Sample

    241117-byy4zsybpl

  • MD5

    8e42d395437a4248b9d740c0098a28d4

  • SHA1

    5f097acbd80e363ed53de123e02e35db144c3efd

  • SHA256

    f3e4d0ae62e681200fb759ba5717b8002bdebdfb5ad2ad92200ad62d03ad5a46

  • SHA512

    11a47d59ffa31416558eec25cc81856d5a6ddcc65f5b02004b57f03bbd27d25ecf0144e881ddfb7e881e025c1690a4659b64c53fbdeadd61a409528c8f8f84d0

  • SSDEEP

    768:DlEmkTHqFlWgQJ27UiY90YutdXoDwnaa0GN1UbHbw3PJ77aAEhw6pY:ZrkTNgQJJiv8mp9Neb7ixEhw6y

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:56698

true-lung.gl.at.ply.gg:56698

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svhost.exe

Targets

    • Target

      7bcff120e45739b923e684e9c246e4c650cdfe3e5fe51399cfba6bcf932bd246.exe

    • Size

      73KB

    • MD5

      af9ff800562a87e5121cad94adb74471

    • SHA1

      ccadb2b20a7ee0cffeffed04e415ca131a7c41bc

    • SHA256

      7bcff120e45739b923e684e9c246e4c650cdfe3e5fe51399cfba6bcf932bd246

    • SHA512

      004d275549a7c0b8ba717a46c9a9b80ecc442db6dd868384a17ba797f1db8a64d6198317ffd28ca619c8fe3ffebb934eb9cb9b60486e8e5c79563206c9aaf892

    • SSDEEP

      1536:q2H3hrFnT3fdHC0+aasbh0bkkNB/cxbRH6TTpH4ONThXiA:nXffdDznmbklxbCTpYOBhSA

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks