General

  • Target

    c2b31974c504751cb32c910ecd190886d0fbe2fd835bd4c9c24ed1d568915c56

  • Size

    735KB

  • Sample

    241203-g8xlsstldt

  • MD5

    d3ac21fafb589042a7012f5992ba2074

  • SHA1

    6a6dfd5cca3055e112bf03f73fb00eb3c434ab55

  • SHA256

    c2b31974c504751cb32c910ecd190886d0fbe2fd835bd4c9c24ed1d568915c56

  • SHA512

    e89acf2e26ba009e8d571f6f2bdb11a1c6d71fedfee45ac4d6f057c6feb99a7eb627255e120c7c3f7613d6b8b20ae85e23e684ac024ed69187173ac13b93c1cd

  • SSDEEP

    12288:hyveQB/fTHIGaPkKEYzURNAwbAgUb47Om2u/eciUAWSTgL1GFrXjcufkv5+jR:huDXTIGaPhEYzUzA0oegbcthGFrXjZkE

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:8848

23.ip.gl.ply.gg:8848

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      c2b31974c504751cb32c910ecd190886d0fbe2fd835bd4c9c24ed1d568915c56

    • Size

      735KB

    • MD5

      d3ac21fafb589042a7012f5992ba2074

    • SHA1

      6a6dfd5cca3055e112bf03f73fb00eb3c434ab55

    • SHA256

      c2b31974c504751cb32c910ecd190886d0fbe2fd835bd4c9c24ed1d568915c56

    • SHA512

      e89acf2e26ba009e8d571f6f2bdb11a1c6d71fedfee45ac4d6f057c6feb99a7eb627255e120c7c3f7613d6b8b20ae85e23e684ac024ed69187173ac13b93c1cd

    • SSDEEP

      12288:hyveQB/fTHIGaPkKEYzURNAwbAgUb47Om2u/eciUAWSTgL1GFrXjcufkv5+jR:huDXTIGaPhEYzUzA0oegbcthGFrXjZkE

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks