General

  • Target

    dotnet-sdk-9.0.100-win-64 (1).exe

  • Size

    212.9MB

  • Sample

    241126-a5824asjdk

  • MD5

    1ae771c20005b76b9296feca0926cc81

  • SHA1

    a789708d3222e0e6e9b1705003b13e0404a6139c

  • SHA256

    14e1543b36090ee77218206f2e1e39e320271f103978cdb00cab1299d192a118

  • SHA512

    534e1629204bd81f61c184e99c5d45756b4b7c1606b76ea1f5ff73b920fc5aa0e919e09dd61b96ee6063d650d7c9bc0caf9f27183633c1980c0372f7550a55b2

  • SSDEEP

    6291456:E4IJevymSdk7X1mLLoAwI7qpB6WDOWhOYj+aeI3dUjnD5:8ENwLLo87SBQWhO6eItyD

Malware Config

Extracted

Family

xworm

C2

45.88.91.138:4200

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      dotnet-sdk-9.0.100-win-64 (1).exe

    • Size

      212.9MB

    • MD5

      1ae771c20005b76b9296feca0926cc81

    • SHA1

      a789708d3222e0e6e9b1705003b13e0404a6139c

    • SHA256

      14e1543b36090ee77218206f2e1e39e320271f103978cdb00cab1299d192a118

    • SHA512

      534e1629204bd81f61c184e99c5d45756b4b7c1606b76ea1f5ff73b920fc5aa0e919e09dd61b96ee6063d650d7c9bc0caf9f27183633c1980c0372f7550a55b2

    • SSDEEP

      6291456:E4IJevymSdk7X1mLLoAwI7qpB6WDOWhOYj+aeI3dUjnD5:8ENwLLo87SBQWhO6eItyD

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks