General

  • Target

    a8bd5b655845ba8a23a38abfd7e1bb03.bin

  • Size

    407KB

  • Sample

    241119-b25e6szark

  • MD5

    65ebff9e48da14ffadff9fb1c0f5eedd

  • SHA1

    9ceea47d9a55a80d2570bd4ea0942338836d5b9c

  • SHA256

    0ee2a7df29906b7f4567d2861efddfe6302ee0c1b042aabcddec52f53190bc37

  • SHA512

    d34b8c1440985ce4acd3f6159a55bdb92f9f73a2632b5e78a1a2861857be805fe63db35fe84cfbbc85771aacbd8c918333d85f50017d8e429c4e6357c7a42fc3

  • SSDEEP

    12288:lIwekJYoPUXr0BCTK2VVr/MS9LUe52Hf8ue:lIw5JYoAtVVrUK2/8n

Malware Config

Extracted

Family

xworm

C2

45.84.199.152:7000

Attributes
  • Install_directory

    %Public%

  • install_file

    Msedge.exe

Targets

    • Target

      f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe

    • Size

      867KB

    • MD5

      a8bd5b655845ba8a23a38abfd7e1bb03

    • SHA1

      90b245be80f5beb8b7b0e50bf910e1b4bff1f1cf

    • SHA256

      f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc

    • SHA512

      f560893e04ee817be99c07a42ea654ce3f2ceaddcb3a644094a5316333ce85911f87eb06c10960673d53050e9b4a60410f0c61169c21e203014ba338138ed664

    • SSDEEP

      12288:i98NVBjvwSRz04lj4k/GG6yY5adl8M64mzx8B/wmtilK6yEbx9:vV9vT5lj4MGdyY5SWv4mM/eyEr

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks