General

  • Target

    download.exe

  • Size

    81KB

  • Sample

    241120-m1ghhawjf1

  • MD5

    dc737cb6aefc2e14b47d8ac9ef3ad765

  • SHA1

    af53fd19ad1e52e4d8eebd1ff4870cd1f73956ff

  • SHA256

    42f805aa109b4f82ced6ee3b43b74fdfd7b7770cbced3a493a74d2470abf43ca

  • SHA512

    1892f201979aed4b302d95e6e9e6f2ca9ed21121fe067e26e74618e73228340fcc6bb17126c0ed717d354ad968e25ba8b255879d1619454084c7e3f795ea7b0b

  • SSDEEP

    1536:4fiCdy2/21CFLzR/jofU0WVUzT0bWg76uIUROLfcxj6VO3VhB2dZ:Wo2kiFosV80bVrIAOLCjoOFhO

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:56855

actually-partly.gl.at.ply.gg:56855

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    dllhost.exe

Targets

    • Target

      download.exe

    • Size

      81KB

    • MD5

      dc737cb6aefc2e14b47d8ac9ef3ad765

    • SHA1

      af53fd19ad1e52e4d8eebd1ff4870cd1f73956ff

    • SHA256

      42f805aa109b4f82ced6ee3b43b74fdfd7b7770cbced3a493a74d2470abf43ca

    • SHA512

      1892f201979aed4b302d95e6e9e6f2ca9ed21121fe067e26e74618e73228340fcc6bb17126c0ed717d354ad968e25ba8b255879d1619454084c7e3f795ea7b0b

    • SSDEEP

      1536:4fiCdy2/21CFLzR/jofU0WVUzT0bWg76uIUROLfcxj6VO3VhB2dZ:Wo2kiFosV80bVrIAOLCjoOFhO

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks