General

  • Target

    DualSenseX-Setup.exe

  • Size

    197KB

  • Sample

    241121-en69dszamr

  • MD5

    9aea7117bf08f34186db7a1049fbb959

  • SHA1

    35189cd5a66b5dbd7c0b5da42497f829585988d0

  • SHA256

    65fa0b7a03e34182a829f8dceb104c49e5b237ade3e838ad93f98a64af6247f4

  • SHA512

    01e042b3a3d8c5be41f1a68708a07a29df60e2318a3dbcbd62705e6428d0dd1214a9d580dacf1961d4bb26f6b2486f701a3d15773656edda1d5432a9376cc250

  • SSDEEP

    6144:iewbg6xDOWpzIqNTuhPTppGpgwnIIO8FFJmQ7:iEwOW9IGTuhPTppGpgwnrV

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:37611

Name1442-37611.portmap.host:37611

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      DualSenseX-Setup.exe

    • Size

      197KB

    • MD5

      9aea7117bf08f34186db7a1049fbb959

    • SHA1

      35189cd5a66b5dbd7c0b5da42497f829585988d0

    • SHA256

      65fa0b7a03e34182a829f8dceb104c49e5b237ade3e838ad93f98a64af6247f4

    • SHA512

      01e042b3a3d8c5be41f1a68708a07a29df60e2318a3dbcbd62705e6428d0dd1214a9d580dacf1961d4bb26f6b2486f701a3d15773656edda1d5432a9376cc250

    • SSDEEP

      6144:iewbg6xDOWpzIqNTuhPTppGpgwnIIO8FFJmQ7:iEwOW9IGTuhPTppGpgwnrV

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks