General

  • Target

    winlocker.exe

  • Size

    39.5MB

  • Sample

    241117-gb719s1rdt

  • MD5

    cd4d337ac30d004b93a6ae176704cf24

  • SHA1

    3f5f240bc6a49b81ea948f3989fe12c373b31ff9

  • SHA256

    f1fceedb23db0880361aa4c981efb49fa5bd361bec10741d3821e53752cd6588

  • SHA512

    4b7be85b352a10993de06f19fe0bc954265a3476a12482b06a000c840095650b79108278b4fb04cc6818abe29c14c00df96d3f4f0af6b2135d9c65d180f7db88

  • SSDEEP

    786432:3+gX4BMdhwzTQXR5FbPp6FcSS5U/LT2KzVyPVLBd5gPQYErOcvIy3:ZXGMK4XR3bLSCU/+6yPl358PE9Iy3

Malware Config

Extracted

Family

xworm

C2

while-stuffed.gl.at.ply.gg:61275

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

Targets

    • Target

      winlocker.exe

    • Size

      39.5MB

    • MD5

      cd4d337ac30d004b93a6ae176704cf24

    • SHA1

      3f5f240bc6a49b81ea948f3989fe12c373b31ff9

    • SHA256

      f1fceedb23db0880361aa4c981efb49fa5bd361bec10741d3821e53752cd6588

    • SHA512

      4b7be85b352a10993de06f19fe0bc954265a3476a12482b06a000c840095650b79108278b4fb04cc6818abe29c14c00df96d3f4f0af6b2135d9c65d180f7db88

    • SSDEEP

      786432:3+gX4BMdhwzTQXR5FbPp6FcSS5U/LT2KzVyPVLBd5gPQYErOcvIy3:ZXGMK4XR3bLSCU/+6yPl358PE9Iy3

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks