General

  • Target

    Api-AutoUpdater.exe

  • Size

    79KB

  • Sample

    241117-cytpyaygqf

  • MD5

    2daa43c9c565faf24f1734caf5153215

  • SHA1

    946272bab59c119caabce1bb33ca6ac4b286ccf9

  • SHA256

    49f513bcc1641f438b6a4e41323db9243988c684bb2cc9690d6d6918787ead76

  • SHA512

    7e713e59367f5a23402d89d78139d20b9989c6a17774a0e0b52e75bee0713de853e8b5773d7b16db1e0315504064edf2c8c118af7e38cea2834181b078f397be

  • SSDEEP

    1536:hOaaiw5/XPr2SsofFni8Mjv1bMFXeOAP6h6a11TyO/6Yd3H:qvPuo1u1bMFAP631VyOSyH

Malware Config

Extracted

Family

xworm

C2

job-moore.gl.at.ply.gg:49404

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Helper.exe

Targets

    • Target

      Api-AutoUpdater.exe

    • Size

      79KB

    • MD5

      2daa43c9c565faf24f1734caf5153215

    • SHA1

      946272bab59c119caabce1bb33ca6ac4b286ccf9

    • SHA256

      49f513bcc1641f438b6a4e41323db9243988c684bb2cc9690d6d6918787ead76

    • SHA512

      7e713e59367f5a23402d89d78139d20b9989c6a17774a0e0b52e75bee0713de853e8b5773d7b16db1e0315504064edf2c8c118af7e38cea2834181b078f397be

    • SSDEEP

      1536:hOaaiw5/XPr2SsofFni8Mjv1bMFXeOAP6h6a11TyO/6Yd3H:qvPuo1u1bMFAP631VyOSyH

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks