General

  • Target

    Windows Security.exe

  • Size

    1018KB

  • Sample

    241120-y5tt6sxkhl

  • MD5

    d8cdeec022d5fda0ab78a7ecc9efa3ae

  • SHA1

    3cb31d1646d3f63019a0c3745d3f2c62bdaab243

  • SHA256

    e5b7e580db8476b8e4d2ae806288984df4eb0c5a061bed61c77157a2628ae1ea

  • SHA512

    4ddd191a8c352cef83ba3dee0a2ba15fcd95c397fc13af152c2ef9731ec66c7ee332c8079567ee03e77a38225a8453aee798f573d25c35cb98921d09597ed63e

  • SSDEEP

    24576:XbtbpPQmXpEBWVs/gwVMHGLZxE7VocApcQ:r1pQmXpAW0B4GLZQ+cp

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      Windows Security.exe

    • Size

      1018KB

    • MD5

      d8cdeec022d5fda0ab78a7ecc9efa3ae

    • SHA1

      3cb31d1646d3f63019a0c3745d3f2c62bdaab243

    • SHA256

      e5b7e580db8476b8e4d2ae806288984df4eb0c5a061bed61c77157a2628ae1ea

    • SHA512

      4ddd191a8c352cef83ba3dee0a2ba15fcd95c397fc13af152c2ef9731ec66c7ee332c8079567ee03e77a38225a8453aee798f573d25c35cb98921d09597ed63e

    • SSDEEP

      24576:XbtbpPQmXpEBWVs/gwVMHGLZxE7VocApcQ:r1pQmXpAW0B4GLZQ+cp

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks