General

  • Target

    2712b14698095b857bbfd96d2515b7e67fe54f29766250c56dd0e1d758c00ec2

  • Size

    230KB

  • Sample

    241122-zl3teaymhx

  • MD5

    6992db399b2fe1dc7be4c4f11af6a7a0

  • SHA1

    bb04436b049a753105c9464199458715c0a3a3a8

  • SHA256

    2712b14698095b857bbfd96d2515b7e67fe54f29766250c56dd0e1d758c00ec2

  • SHA512

    ba27a34f696c92a95a0441a5c2230c8795327d9d4c6ee327b9c7e5c2394eee7c52598fe62cb52e4b1a0bc93589daedd82c7368f26f89d2fa93589a73c157bb70

  • SSDEEP

    3072:rfLfjuSf9b6tOqNyLD8KbgVtn8Mo8G1gVziHzZbIK1YKB/pCAcNqXhwBV3yxSQij:Ki9bv/5bTgVziHzZnSKrCbYMj+bl83q

Malware Config

Extracted

Family

xworm

Attributes
  • install_file

    Mason.exe

aes.plain

Targets

    • Target

      2712b14698095b857bbfd96d2515b7e67fe54f29766250c56dd0e1d758c00ec2

    • Size

      230KB

    • MD5

      6992db399b2fe1dc7be4c4f11af6a7a0

    • SHA1

      bb04436b049a753105c9464199458715c0a3a3a8

    • SHA256

      2712b14698095b857bbfd96d2515b7e67fe54f29766250c56dd0e1d758c00ec2

    • SHA512

      ba27a34f696c92a95a0441a5c2230c8795327d9d4c6ee327b9c7e5c2394eee7c52598fe62cb52e4b1a0bc93589daedd82c7368f26f89d2fa93589a73c157bb70

    • SSDEEP

      3072:rfLfjuSf9b6tOqNyLD8KbgVtn8Mo8G1gVziHzZbIK1YKB/pCAcNqXhwBV3yxSQij:Ki9bv/5bTgVziHzZnSKrCbYMj+bl83q

    • Detect Xworm Payload

    • Modifies security service

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks