General
-
Target
rat.exe
-
Size
41KB
-
Sample
241120-t57c2syhjf
-
MD5
4f1165749ca148c4e5e1cc9668b77362
-
SHA1
59bc26664dc28a62583406c4a76ecc63e5868dc8
-
SHA256
3f72d384eb716a3fb5da70541e033e0dca76f2479d8c64c0087c8c9dc3c6148b
-
SHA512
610f4939228790155716ec3574838a6dd49a339dd669667fcd4a2dd552f3558c82ac3f51507b91ba7d26717007095114cfc5b313d6db93a6b10fe905869b7c5a
-
SSDEEP
768:8yIOKKVKWC6uzXvgggCLJF5PG9pmeX6vOwhT3Emzy:8zbKVKWLcXvvgcFI9AeX6vOwt9O
Malware Config
Extracted
xworm
5.0
tcp://ikonik2681-35277.portmap.host:35277
E9ghqILQRlbkHiLe
-
Install_directory
%AppData%
-
install_file
$77MicrosoftDefender.exe
Targets
-
-
Target
rat.exe
-
Size
41KB
-
MD5
4f1165749ca148c4e5e1cc9668b77362
-
SHA1
59bc26664dc28a62583406c4a76ecc63e5868dc8
-
SHA256
3f72d384eb716a3fb5da70541e033e0dca76f2479d8c64c0087c8c9dc3c6148b
-
SHA512
610f4939228790155716ec3574838a6dd49a339dd669667fcd4a2dd552f3558c82ac3f51507b91ba7d26717007095114cfc5b313d6db93a6b10fe905869b7c5a
-
SSDEEP
768:8yIOKKVKWC6uzXvgggCLJF5PG9pmeX6vOwhT3Emzy:8zbKVKWLcXvvgcFI9AeX6vOwt9O
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1