General

  • Target

    WaveCrack.rar

  • Size

    157KB

  • Sample

    241121-ht5vaszkft

  • MD5

    2a9b82ce86dbc06fcc20b0207c01574a

  • SHA1

    3c642c5b7793dc43ad340528c5a053bb64be034e

  • SHA256

    12bc7739ff2e83c94c4ccff18eba664e1697ffb9db986c446c8fb35a663c3a00

  • SHA512

    414a96ff9669b07ef64b227a0b2ffd496f4f854aee1ca6cd25db1af225a5250a79df5e928fdb1f90af9b64b4d5a9f72ea4ebeabf3243c9abccdc8deca184bd1f

  • SSDEEP

    3072:YxnIRtVe99moX27iXV27hzN+CNOY4Y5MdSD7PejbF7FV:YJSHsoo/V27lNnwY4nSDTejx7FV

Malware Config

Extracted

Family

xworm

C2

23.ip.gl.ply.gg:57660

Attributes
  • Install_directory

    %AppData%

  • install_file

    msedge.exe

Targets

    • Target

      runtime/msedge_visual_render.exe

    • Size

      188KB

    • MD5

      e796b778b392f06de4d340ec0f88b4cc

    • SHA1

      32561bf3b022aef8a62bac3e820ef7e3bc648f57

    • SHA256

      1ff08d4cbe1a41c10692941c7835b93ea5738057dc381cf4704136436911df05

    • SHA512

      dcdbeb8d1720b2bfe8ce8c2311414b71ec090eb94db53d379c08cbf7b17a25ac4bc9488315e867406bb1661a76df223c953f01c7d40997fdf9ccb20daaf4c8c7

    • SSDEEP

      3072:2rhv4AbmL4mkbrz9EO7PvJKRUGKXs+S++7KFSbxeY+qDDrMn:2r7bmclbX3ZGqStKEbxI

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks