General

  • Target

    e796b778b392f06de4d340ec0f88b4cc.bin

  • Size

    93KB

  • Sample

    241117-calpesydqn

  • MD5

    e7b6369fca4a5f61847ae26f133fc90a

  • SHA1

    6b0b23666a4a6547021b9fe2ae9b01dfdbfe4d59

  • SHA256

    18d37313e2031210a8fc92e46838675fe446b1d43f927ab765b8020f133e6522

  • SHA512

    da27f43d32982ef85f3da325f7da5f3207c05a703c0156f04c98347dcaab40e940ad6243f0fb99886d6eee00af85ae96d5ad7a99920a8eeeb980ba066eae13de

  • SSDEEP

    1536:0G6W8MYUuEOI6Q+qy1Gt+YbEydftDCkSpKf9agsb1S1XBGcTn6HhFFy0l+:VIELwqyWbE2tDCkiK8U1XByvFy0l+

Malware Config

Extracted

Family

xworm

C2

23.ip.gl.ply.gg:57660

Attributes
  • Install_directory

    %AppData%

  • install_file

    msedge.exe

Targets

    • Target

      1ff08d4cbe1a41c10692941c7835b93ea5738057dc381cf4704136436911df05.exe

    • Size

      188KB

    • MD5

      e796b778b392f06de4d340ec0f88b4cc

    • SHA1

      32561bf3b022aef8a62bac3e820ef7e3bc648f57

    • SHA256

      1ff08d4cbe1a41c10692941c7835b93ea5738057dc381cf4704136436911df05

    • SHA512

      dcdbeb8d1720b2bfe8ce8c2311414b71ec090eb94db53d379c08cbf7b17a25ac4bc9488315e867406bb1661a76df223c953f01c7d40997fdf9ccb20daaf4c8c7

    • SSDEEP

      3072:2rhv4AbmL4mkbrz9EO7PvJKRUGKXs+S++7KFSbxeY+qDDrMn:2r7bmclbX3ZGqStKEbxI

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks