General

  • Target

    fuckd.exe

  • Size

    67KB

  • Sample

    241120-b5dfvsybnm

  • MD5

    ad1e05ad9933986e699e2313a067a02d

  • SHA1

    9e4f60f224eb0957124b62f4836a87105cf2449c

  • SHA256

    1a1a2ef3e0060ed1cff4c3af265705e04a0b227321946461778c1e81616e770b

  • SHA512

    c2de8f0d328b730360e816bf06ed71a8cbdc7d1debe6c1148ec2d97c8aac7c12e6fef8270d6139f46b1ad9c604d3660069c61b18d29df90649e2c9c6f9576da0

  • SSDEEP

    1536:li36LmfKSmF8aczrknSb1bxzAoWFOc6I3YONygapcZ:lqo9SmYMSb1VaYONyMZ

Malware Config

Extracted

Family

xworm

C2

period-preview.gl.at.ply.gg:62237

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

Targets

    • Target

      fuckd.exe

    • Size

      67KB

    • MD5

      ad1e05ad9933986e699e2313a067a02d

    • SHA1

      9e4f60f224eb0957124b62f4836a87105cf2449c

    • SHA256

      1a1a2ef3e0060ed1cff4c3af265705e04a0b227321946461778c1e81616e770b

    • SHA512

      c2de8f0d328b730360e816bf06ed71a8cbdc7d1debe6c1148ec2d97c8aac7c12e6fef8270d6139f46b1ad9c604d3660069c61b18d29df90649e2c9c6f9576da0

    • SSDEEP

      1536:li36LmfKSmF8aczrknSb1bxzAoWFOc6I3YONygapcZ:lqo9SmYMSb1VaYONyMZ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks