General

  • Target

    XWorm V5.6.exe

  • Size

    7.0MB

  • Sample

    241202-qtw66avrcz

  • MD5

    70a913973c647c9870c7b583a2d015ea

  • SHA1

    65fdac5c3c58626c9be3d95515bec0bd5d18e61e

  • SHA256

    dc65da3dbed13577bea7ad3e0acb999f26a10f586735272cf83aadcc02e03dcf

  • SHA512

    8eb699aa83a3de1f2d9289ff8cc9af82c81a17de45d75ca32fb8bcfe441ee3747fde6327eaa49af255c4929e24da9b04b9efa974781cfd0ddcf1aae88920c813

  • SSDEEP

    196608:835zKSnoyTKuu0Na8JLXDFQA9YMC5UR6s6eFV5SYpAjrYS:839rnoyTJJDD2xD5u6s1V5SCAH

Malware Config

Extracted

Family

xworm

Version

5.0

C2

educational-baptist.gl.at.ply.gg:58219

Mutex

VoRbaceScB5GbF5t

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XWorm V5.6.exe

    • Size

      7.0MB

    • MD5

      70a913973c647c9870c7b583a2d015ea

    • SHA1

      65fdac5c3c58626c9be3d95515bec0bd5d18e61e

    • SHA256

      dc65da3dbed13577bea7ad3e0acb999f26a10f586735272cf83aadcc02e03dcf

    • SHA512

      8eb699aa83a3de1f2d9289ff8cc9af82c81a17de45d75ca32fb8bcfe441ee3747fde6327eaa49af255c4929e24da9b04b9efa974781cfd0ddcf1aae88920c813

    • SSDEEP

      196608:835zKSnoyTKuu0Na8JLXDFQA9YMC5UR6s6eFV5SYpAjrYS:839rnoyTJJDD2xD5u6s1V5SCAH

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks