Resubmissions

18/11/2024, 03:48

241118-ec89lsyaqq 4

18/11/2024, 03:43

241118-d9775syajn 10

General

  • Target

    XBinderOutput.exe

  • Size

    5.9MB

  • Sample

    241118-d9775syajn

  • MD5

    60f03d0114c4a2d8482d9dfe83d0af60

  • SHA1

    73f8ada208b9ec7741e4bf4acd5ddf5a4bdcde1a

  • SHA256

    93e3e42353e27711fb81201a6381ccce33579b9724f076b42a918b5c85ccb5eb

  • SHA512

    455dca87350e0fbd945c501b4c035340650ff12359dc10f28e70a91a98b611cd4ee9545d64a800be91792a85d6db101aeee996752c196ecabba7bbb4cbf38697

  • SSDEEP

    98304:o39KIlNDBJ9AwQSHN3/cqY5w2ZVrBYn3zT9bARVx4qpAXAAry8WeRSOHgitPWhj:eDX95cZpLBmSVxz4AA28WeRJHgit+hj

Malware Config

Extracted

Family

xworm

C2

man-laughing.gl.at.ply.gg:57783

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    Windows Data Compiler.exe

Targets

    • Target

      XBinderOutput.exe

    • Size

      5.9MB

    • MD5

      60f03d0114c4a2d8482d9dfe83d0af60

    • SHA1

      73f8ada208b9ec7741e4bf4acd5ddf5a4bdcde1a

    • SHA256

      93e3e42353e27711fb81201a6381ccce33579b9724f076b42a918b5c85ccb5eb

    • SHA512

      455dca87350e0fbd945c501b4c035340650ff12359dc10f28e70a91a98b611cd4ee9545d64a800be91792a85d6db101aeee996752c196ecabba7bbb4cbf38697

    • SSDEEP

      98304:o39KIlNDBJ9AwQSHN3/cqY5w2ZVrBYn3zT9bARVx4qpAXAAry8WeRSOHgitPWhj:eDX95cZpLBmSVxz4AA28WeRJHgit+hj

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks