General

  • Target

    c9faa2b4ac0f4502e84433b2636cf532960d2065e6089f74b8a18afe915a84da.exe

  • Size

    45KB

  • Sample

    241120-qcy97axfpr

  • MD5

    50865a176b8488660e702360586d9095

  • SHA1

    9243deb9dea940b01eae75f7771074d9e5ae40f4

  • SHA256

    c9faa2b4ac0f4502e84433b2636cf532960d2065e6089f74b8a18afe915a84da

  • SHA512

    1a6b5b540658adeb22c797233b834dfa7ce137708dda90659d3e62860db178f008d7cadaccc165cea63b338c7688ccce75ba1482e6c9ed7d6566a01aaad47303

  • SSDEEP

    768:qbG5pfJFqBb6CoE0RwnuU3zQK4JTXBlirp9bqY5wu6v6QhOObOPmOi5:aG5oBDorRwuUDKbPit9bH5K6QsOSPmOk

Malware Config

Extracted

Family

xworm

Version

5.0

C2

23.ip.gl.ply.gg:51779

Mutex

SXjK4ZMu0P1Nn0Nq

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

aes.plain

Targets

    • Target

      c9faa2b4ac0f4502e84433b2636cf532960d2065e6089f74b8a18afe915a84da.exe

    • Size

      45KB

    • MD5

      50865a176b8488660e702360586d9095

    • SHA1

      9243deb9dea940b01eae75f7771074d9e5ae40f4

    • SHA256

      c9faa2b4ac0f4502e84433b2636cf532960d2065e6089f74b8a18afe915a84da

    • SHA512

      1a6b5b540658adeb22c797233b834dfa7ce137708dda90659d3e62860db178f008d7cadaccc165cea63b338c7688ccce75ba1482e6c9ed7d6566a01aaad47303

    • SSDEEP

      768:qbG5pfJFqBb6CoE0RwnuU3zQK4JTXBlirp9bqY5wu6v6QhOObOPmOi5:aG5oBDorRwuUDKbPit9bH5K6QsOSPmOk

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks