General

  • Target

    lamysoft.exe

  • Size

    115KB

  • Sample

    241117-pfkqjatpgq

  • MD5

    e716953f2f1a17a9e1e00d03c022267e

  • SHA1

    7f63945c042018d1688c77abc4d6c171b763a527

  • SHA256

    7e61107c764e924e2e7b2dfca37bf2d8f6c440014a92e69bdd6d70ae84dde8c8

  • SHA512

    450a53a41bd517faf298728efabd599fc983caa3197e9a04e6674179ca0d26e7cd92341033ae71ebd3ab40277b997cf9923b596a9498dbddfd0ebc62186a2449

  • SSDEEP

    3072:2G1gT1mBpTl5JcIdm++b8IaGGWxBOo9gn/Ufv3hsX:2GGm3LJJdmnbzaGZ3S/iv3

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:47359

23.ip.gl.ply.gg:47359

Attributes
  • Install_directory

    %AppData%

  • install_file

    rat.exe

  • telegram

    https://api.telegram.org/bot7327399950:AAEE8XHvYDeAYqClq1sW-CApcW7Mmn1gxoQ/sendMessage?chat_id=7223021103

Targets

    • Target

      lamysoft.exe

    • Size

      115KB

    • MD5

      e716953f2f1a17a9e1e00d03c022267e

    • SHA1

      7f63945c042018d1688c77abc4d6c171b763a527

    • SHA256

      7e61107c764e924e2e7b2dfca37bf2d8f6c440014a92e69bdd6d70ae84dde8c8

    • SHA512

      450a53a41bd517faf298728efabd599fc983caa3197e9a04e6674179ca0d26e7cd92341033ae71ebd3ab40277b997cf9923b596a9498dbddfd0ebc62186a2449

    • SSDEEP

      3072:2G1gT1mBpTl5JcIdm++b8IaGGWxBOo9gn/Ufv3hsX:2GGm3LJJdmnbzaGZ3S/iv3

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks