General

  • Target

    Xworm.V6.0.zip

  • Size

    28.7MB

  • Sample

    241129-ej8xeszlgm

  • MD5

    ce625cf1e3e25d470c2e7a298409dab2

  • SHA1

    94f465e9baa3099c2a7b8e5d30e8fc481b0b41a3

  • SHA256

    6b66904ae1929991852392fe2d578712738799cdd82539507d714f536eb8e0ed

  • SHA512

    0ac55745455542d68be326f5e5d48131da093ba47c24cfd06c2be0f3f0651219bf692b3fed5ac62cd16a191c0f7852b73ef8bc709f344eb3b36948b44bc3a480

  • SSDEEP

    786432:OHqaRtCZZfm0+lGmlNinnXEDggGiO72vAgbHGaG:OHqytCO0+lF0hgGZNgbHGp

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

EEarXqazEvX73BCq

Attributes
  • Install_directory

    %AppData%

  • install_file

    Chrome Update.exe

  • pastebin_url

    https://pastebin.com/raw/RPPi3ByL

aes.plain
aes.plain
aes.plain

Targets

    • Target

      Xworm.V6.0.zip

    • Size

      28.7MB

    • MD5

      ce625cf1e3e25d470c2e7a298409dab2

    • SHA1

      94f465e9baa3099c2a7b8e5d30e8fc481b0b41a3

    • SHA256

      6b66904ae1929991852392fe2d578712738799cdd82539507d714f536eb8e0ed

    • SHA512

      0ac55745455542d68be326f5e5d48131da093ba47c24cfd06c2be0f3f0651219bf692b3fed5ac62cd16a191c0f7852b73ef8bc709f344eb3b36948b44bc3a480

    • SSDEEP

      786432:OHqaRtCZZfm0+lGmlNinnXEDggGiO72vAgbHGaG:OHqytCO0+lF0hgGZNgbHGp

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks