General

  • Target

    ed217363c6941d6973c68018b3579703fcb2e3dcc903f868f3c17a04bef57c82

  • Size

    415KB

  • Sample

    241202-mfs1ss1jet

  • MD5

    08db00b200723dad6067e9c99cdc819a

  • SHA1

    bf455fe05eb3ac9b0248efef33254befa7f035a2

  • SHA256

    ed217363c6941d6973c68018b3579703fcb2e3dcc903f868f3c17a04bef57c82

  • SHA512

    486bc356496b64c6d5f5387d24cdead7a8ccaec393120dc95689dac6a5b759739cf6255150d3a7914d95bc9f5fe16e02212d888f160abb91c58e8f852bbd78b5

  • SSDEEP

    12288:FoaYwa+54OxqfeXzZCrzE9IYXuSf4x/nv4MTaxnKXxXaa:Fiw94OcAzwYIY+Sf4x/zTJX5aa

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

7r54Iv7WwsTgLPOp

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/UjEMadMV

aes.plain

Targets

    • Target

      Datasheet.scr

    • Size

      476KB

    • MD5

      eb23d50af27df1288faf92898cccc3d3

    • SHA1

      f82e28701d256af04e7728c19dd5329dd23760f2

    • SHA256

      0e2ab563262e27e9095c4c1e055d25974c7f8d767de7d97d8943306268a54d33

    • SHA512

      70fa97b3620b569d4f304b97a3f22ea720b4dcc8007301ee0a54b3d9f901670962a08becd45b43838506d88a6b5eb4a5e4a6e43b26eb5b30202ac5f2c403c457

    • SSDEEP

      12288:o8PZsrAXeXzKinig6dpXnWq4U5usx+Xti:o80zKhHV4Ux

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks