General

  • Target

    16dfbf67c7ef26c033309725e495ce48.bin

  • Size

    409KB

  • Sample

    241203-bdcegs1qht

  • MD5

    cc3fc2b4d94411bfd69e213a1e1e1f09

  • SHA1

    c25a127ece960dcf7ea9df6a274a18ec68c7d476

  • SHA256

    f5f0d4dedca85a3845176c4c30f95853c02a7ee674f96b672f702c726d400303

  • SHA512

    679e2823e9828bab250a74167af061674caad2871e6690420b6f78111eeae92b00d2c7d72bc83bc9c7844ab7ebada86181940ffaa82440e29de6f318e2e6bacb

  • SSDEEP

    6144:n1fIP459P/QjAdKP9d+rSFKUkJhT0+BYJgTATV1F2RSbHsz63q5X0Pyflu9b12NF:nNIG9P/QsK/++ATqF0Cszcetgb1s1

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:446

Azuu-57677.portmap.io:446

remember-sail.gl.at.ply.gg:446

Attributes
  • Install_directory

    %Public%

  • install_file

    usb.exe

Targets

    • Target

      415abd7fb89262dc08b47ed0e322ba556b764f331d33e6b96da9aa3bd16c985b.exe

    • Size

      540KB

    • MD5

      16dfbf67c7ef26c033309725e495ce48

    • SHA1

      9dc8e5216008218aad719808c3af85eed3634d98

    • SHA256

      415abd7fb89262dc08b47ed0e322ba556b764f331d33e6b96da9aa3bd16c985b

    • SHA512

      0e52f5b398c28d32b96725afdd897cfe39b2b0506b084ecf75e86419b32ecd87592af3c633c15c6895fbfee1132fa507bf02b801bf2d17401ffc4415e4268525

    • SSDEEP

      12288:xtH5NLaAdDhAAEIFcX+tb2NGi820zTMk9JVRrqZ2E:xtH5sAdXEIFJ2NL50z79JVRrqZH

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks