General

  • Target

    8f09ed557e41e7fcc2be5148ea38d2a7e8d2c8df018131de9762b7af940589ff

  • Size

    832KB

  • Sample

    241203-a5r4ks1mhx

  • MD5

    b4e1f9d294cf60e72e3050b7c3cac673

  • SHA1

    9b24c22843d523aca1dc3c3cc3e1c5f47e4cb06e

  • SHA256

    8f09ed557e41e7fcc2be5148ea38d2a7e8d2c8df018131de9762b7af940589ff

  • SHA512

    840a28ad80ca371b00a5f5a0f3db48f003f71d2bd0fa93914ff575bca4e6f3e65c6b7b53957c0363a594cde948e5b87fa93b219e0d1c0082559db5a72364631c

  • SSDEEP

    24576:TuDXTIGaPhEYzUzA01c9Iyokff+DEZB36NvWiVo/UeQZ0:6Djlabwz9CxZ56NOiVg+0

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:36077

23.ip.gl.ply.gg:36077

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      8f09ed557e41e7fcc2be5148ea38d2a7e8d2c8df018131de9762b7af940589ff

    • Size

      832KB

    • MD5

      b4e1f9d294cf60e72e3050b7c3cac673

    • SHA1

      9b24c22843d523aca1dc3c3cc3e1c5f47e4cb06e

    • SHA256

      8f09ed557e41e7fcc2be5148ea38d2a7e8d2c8df018131de9762b7af940589ff

    • SHA512

      840a28ad80ca371b00a5f5a0f3db48f003f71d2bd0fa93914ff575bca4e6f3e65c6b7b53957c0363a594cde948e5b87fa93b219e0d1c0082559db5a72364631c

    • SSDEEP

      24576:TuDXTIGaPhEYzUzA01c9Iyokff+DEZB36NvWiVo/UeQZ0:6Djlabwz9CxZ56NOiVg+0

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks