General

  • Target

    Xworm 5.6.exe

  • Size

    212KB

  • Sample

    241117-yl3yqsxcrf

  • MD5

    79a261a7ed31322af647ac3779479773

  • SHA1

    e392f7feeb3ae0e5eb74deebdb0a983a0bb22be5

  • SHA256

    fdc1271b3f571e656af8be8b944641592f2cb27b422756921fbfc6eeef55710e

  • SHA512

    137b082fc232a5112eabc9f9d5c66cc8186f4b5047f0328cc427311d3afd526c3b893896c29ea548bfea20485cf8c09a0299bc71dd0b85a10efd162549c33179

  • SSDEEP

    3072:mIl0bB95AOnVgk0A2ewhLapuvpAsZOyMqmyBeYVYA:/ubVhVnY/GWGwqqm1

Malware Config

Extracted

Family

xworm

C2

java-either.gl.at.ply.gg:50133

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      Xworm 5.6.exe

    • Size

      212KB

    • MD5

      79a261a7ed31322af647ac3779479773

    • SHA1

      e392f7feeb3ae0e5eb74deebdb0a983a0bb22be5

    • SHA256

      fdc1271b3f571e656af8be8b944641592f2cb27b422756921fbfc6eeef55710e

    • SHA512

      137b082fc232a5112eabc9f9d5c66cc8186f4b5047f0328cc427311d3afd526c3b893896c29ea548bfea20485cf8c09a0299bc71dd0b85a10efd162549c33179

    • SSDEEP

      3072:mIl0bB95AOnVgk0A2ewhLapuvpAsZOyMqmyBeYVYA:/ubVhVnY/GWGwqqm1

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks