General

  • Target

    XWorm V5.6 BypChat.zip

  • Size

    24.5MB

  • Sample

    241202-yae3javmbr

  • MD5

    5116c90421cd33a0f65ddb7db5b375a8

  • SHA1

    cc64c23d3499d281ff4157196cb6cf767ce81b16

  • SHA256

    20d451a0dfdbe692e40dd450812ebb94e7b04430acc0de77cecfa4daf1a99e95

  • SHA512

    b9ed3129540e815d24df87a81af4bcd32a27e8585d43059abd073a39ef4349df538ec5b2d61b5705ea167084eb45a16d8edac5fe584eaf40e6a67d3eb7965e11

  • SSDEEP

    393216:LyavqkXFeuBc9Q+FMIZeL859fCGcJ7kj3HHAKbTmbubKXo50Ko+Y2ToxYC:LyxkXDBYQwNZK5kjQKRIo5Ho+0

Malware Config

Targets

    • Target

      XWorm V5.6 BypChat.zip

    • Size

      24.5MB

    • MD5

      5116c90421cd33a0f65ddb7db5b375a8

    • SHA1

      cc64c23d3499d281ff4157196cb6cf767ce81b16

    • SHA256

      20d451a0dfdbe692e40dd450812ebb94e7b04430acc0de77cecfa4daf1a99e95

    • SHA512

      b9ed3129540e815d24df87a81af4bcd32a27e8585d43059abd073a39ef4349df538ec5b2d61b5705ea167084eb45a16d8edac5fe584eaf40e6a67d3eb7965e11

    • SSDEEP

      393216:LyavqkXFeuBc9Q+FMIZeL859fCGcJ7kj3HHAKbTmbubKXo50Ko+Y2ToxYC:LyxkXDBYQwNZK5kjQKRIo5Ho+0

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Sets service image path in registry

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks