General

  • Target

    1d3dd8cded39d5fd34a6d750a17b952d919e18ae457f7c3343426108c8924a59

  • Size

    406KB

  • Sample

    241119-xv35esvqgj

  • MD5

    7772cf3e9c73dca91050f851462c83fa

  • SHA1

    664e76fdf09952eced7614cb1fea512ec9dc328b

  • SHA256

    1d3dd8cded39d5fd34a6d750a17b952d919e18ae457f7c3343426108c8924a59

  • SHA512

    7f3c66787645adb2238fedef9110629f7d25379612140ea75335c303c114eebd4eb270b378183dda1b1611d524d4388e8c99f9faf2183a3ea5d825bafbb4ece7

  • SSDEEP

    6144:Ra1V2G0DaOqOAiBBOF2Ot5LDTK7SjmF9pjYoi3gj3x1jQ9Ton6YoKO:Y1o3DaPEHefuZEoi3wU9To6H

Malware Config

Extracted

Family

xworm

Version

5.0

C2

teebro1800.dynamic-dns.net:2195

Mutex

wyDwhmVwMImivlWa

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      product sample requirement.exe

    • Size

      438KB

    • MD5

      07d5a83558349a82cfa1dc6d68f4d84b

    • SHA1

      064af18045030703bc4c62c99f1abe5700832e8a

    • SHA256

      096b33571e80d18c1763a3bd5d019e3177f1547b3ca6e6205a349075ce2fec18

    • SHA512

      aa9d794e0ffb14163f3d1c2df374b99da287b7ce1df965e271921a700a9972c6ead3830f0319eb9ec2d1352e2c0a06bb192045e482b2d54fe091c29dc58946bf

    • SSDEEP

      12288:pMFo7mq6/FqLzEvttwVnGUaGtyk6JXFajEHUC:pko7mq+I/EOoEIr

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks