General

  • Target

    7f216847540eb24e6b645d97d6836f95.bin

  • Size

    19KB

  • Sample

    241203-bqklmaylgr

  • MD5

    4f806d9db4ea453294680b76cd51ac00

  • SHA1

    90fdb6858e8c9cbf9d58e4a0734c72d1e0a1a6d1

  • SHA256

    18b30e159c3a4beb035810255176dbf6fa211fffde6986bc759bd063161994fb

  • SHA512

    4c3ca721a2daeccd5d5f396428fb91a50ffa309fd7e9032293aaa6b38729eb02393bd4f1aa30130e70cd02c503bd1761ab08e3be4c03b4ad45440975dd61e928

  • SSDEEP

    384:SV/VVmPsHOyWBYxVmJJ4ToIte+32dpf9G2tWPTS/x9iYPAu8J:+2QOCxVmJiTooR2db3W7SYue

Malware Config

Extracted

Family

xworm

Version

5.0

C2

cnet-contracting.gl.at.ply.gg:10206

Mutex

YF672s6uKBT9jk3V

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      f8dbc4373a048b0c649a6f8ab4bc3e9834911846175be93564afe23eb21e4973.exe

    • Size

      40KB

    • MD5

      7f216847540eb24e6b645d97d6836f95

    • SHA1

      972a3de4838c5ea7ed10cd6a318942e4ddb0509f

    • SHA256

      f8dbc4373a048b0c649a6f8ab4bc3e9834911846175be93564afe23eb21e4973

    • SHA512

      1c20355e247c60b194261a49f5af65f96432789ead0ca289b9685245e3579ab19e64f96279815d9b520ed7ad025f5d6d6764391a9266ae0a8b5b61d9fbaf9692

    • SSDEEP

      768:9UIDwCrxY4mpc9i32v6hCuuJf27ZZfFWPG9//v6OOwh9jGb2:9dDwCFY4gckGwCuuJfKFv9//v6OOwHCq

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks