General

  • Target

    8dafa10561f4e98f68c5ec171b6674c4.bin

  • Size

    29KB

  • Sample

    241203-btsreaspft

  • MD5

    86f561bf8bffa6c0a5c2823c640b403c

  • SHA1

    055366aadf51da12253ac057196a517d74a71b9c

  • SHA256

    6be05a0f4a2896bf6d99d10eb6ac41c1fceb068c7c8a7c6acf39bba557df88e3

  • SHA512

    4862ea86efd8245817a06c4681b32d88559df80a7aa5bf213f3f2218fad5f508d8e605cc55b3b9fe9a60cadc2815438daba5d4631083640de2bce3db06631212

  • SSDEEP

    768:rL9wr0aF2qUxkXdHNI8FQNJD4Q6kEl/8jhiKwUdyeyNWjJ:v7puXdnQJokEZfSy8jJ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

main-carnival.gl.at.ply.gg:7329

Mutex

9sDMRFhiOQaxtyhh

Attributes
  • Install_directory

    %AppData%

  • install_file

    powerpoidnt-run.exe

aes.plain

Targets

    • Target

      9e908ab143b191502a5ada13123baae848c9c2d6d59b3190d0c2d8ed18257ac2.exe

    • Size

      403KB

    • MD5

      8dafa10561f4e98f68c5ec171b6674c4

    • SHA1

      a41a738fc81df39b2f818f323d0a99bc6d952de2

    • SHA256

      9e908ab143b191502a5ada13123baae848c9c2d6d59b3190d0c2d8ed18257ac2

    • SHA512

      48ab1db5cf80310a6e73b2fe5defdbe111077bdbac09333c22c34ab86a7d734fa0b193d39f4b4a7698ba3c4421b27217a94fbc5bf6db869dff42aceba4d3d336

    • SSDEEP

      1536:80W+2++0XhzUFY9S1I6rOp7Ronkccckccccc6:80W9++ahzUFY9STOp1ona

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks