General

  • Target

    Complier.exe.exe

  • Size

    8.7MB

  • Sample

    241120-rn3messncj

  • MD5

    2b83acb31286e3675a46c514f7b38554

  • SHA1

    fb37844c5d0d4e2427000a5aea4e6a3acc0814d3

  • SHA256

    78da6bfa78c77c0f8a398be9a48d791036e3f15b9859a241aed7f7e1d20688e5

  • SHA512

    f7725b8e2337c3502bce5e2d1fe1127ddca8212bc53326cc78ede3a6543eb442fd169493a090c54d1f9b216a56225e8d2abf5233a20223ce2f4b7232e5edcc64

  • SSDEEP

    196608:HsttcYiaVW7hyq1WYn56omfTut4jD6+qBbw5T+0nT4UjiSkwC+V1:H4fWz1Wa51mfTutiQB+pMUjl

Malware Config

Extracted

Family

xworm

C2

fun-ce.gl.at.ply.gg:63401

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

Targets

    • Target

      Complier.exe.exe

    • Size

      8.7MB

    • MD5

      2b83acb31286e3675a46c514f7b38554

    • SHA1

      fb37844c5d0d4e2427000a5aea4e6a3acc0814d3

    • SHA256

      78da6bfa78c77c0f8a398be9a48d791036e3f15b9859a241aed7f7e1d20688e5

    • SHA512

      f7725b8e2337c3502bce5e2d1fe1127ddca8212bc53326cc78ede3a6543eb442fd169493a090c54d1f9b216a56225e8d2abf5233a20223ce2f4b7232e5edcc64

    • SSDEEP

      196608:HsttcYiaVW7hyq1WYn56omfTut4jD6+qBbw5T+0nT4UjiSkwC+V1:H4fWz1Wa51mfTutiQB+pMUjl

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks