General

  • Target

    move_me.exe

  • Size

    630KB

  • Sample

    241120-fz515s1fqh

  • MD5

    dcb6f58c69be39bb96d529251b9bc8ce

  • SHA1

    4cc3b9fa4dbbce4de8a22fd93ffe27a8dc4cd8c8

  • SHA256

    9938fe6f27c782cfed83f6ac30cb786ddf7a61cfe5d9b03cd68958b9d5be76e2

  • SHA512

    a406d2ecadf1f3b234962d7572e902c4e573dfac02afc428922e6df814215f8be6b3efaa20cd84f3991fa3f46dc7814de4642d2723472567c9f7abac134d7630

  • SSDEEP

    12288:LqblBvp6fpNR3AybTyY6XJsdWuwgrmf6C301ugVJ1QTJ72n:GBBIfp73tJsJsdWBimf6sQugn1QTJ72n

Malware Config

Extracted

Family

xworm

Version

5.0

C2

soon-console.gl.at.ply.gg:60222

Mutex

uv0uHPhnJRlnE2ie

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows.exe

aes.plain

Targets

    • Target

      move_me.exe

    • Size

      630KB

    • MD5

      dcb6f58c69be39bb96d529251b9bc8ce

    • SHA1

      4cc3b9fa4dbbce4de8a22fd93ffe27a8dc4cd8c8

    • SHA256

      9938fe6f27c782cfed83f6ac30cb786ddf7a61cfe5d9b03cd68958b9d5be76e2

    • SHA512

      a406d2ecadf1f3b234962d7572e902c4e573dfac02afc428922e6df814215f8be6b3efaa20cd84f3991fa3f46dc7814de4642d2723472567c9f7abac134d7630

    • SSDEEP

      12288:LqblBvp6fpNR3AybTyY6XJsdWuwgrmf6C301ugVJ1QTJ72n:GBBIfp73tJsJsdWBimf6sQugn1QTJ72n

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks