General

  • Target

    Solara.exe

  • Size

    43KB

  • Sample

    241203-qct1gawqcz

  • MD5

    a5c594f36fccf6f04552fd2ef8cca82a

  • SHA1

    654fd3bbe89442840010a7cbeccb2346adb0c2d1

  • SHA256

    b3448f4ae8060638bdad47bc3000afd0d5980fe66e09b6b64ae9da9134dcd9b5

  • SHA512

    a66c8ee6212235006b969148a37bc47b4715ef276bd632581c80a39b28f565f5c12235c315ba78e1e251d7c51126af0bd6e2ea32b087616edf595665538a142e

  • SSDEEP

    768:OAoPDwgJOSpuqldThkwh77RXk6mJomGSvFFRPa9Kb6POChgOObKY:OVDwgJOSp7ZvZu19dFA9Kb6POCSHGY

Malware Config

Extracted

Family

xworm

Version

5.0

C2

someone-proportion.gl.at.ply.gg:16444

Mutex

pLZANQ75KjAVVEWN

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    System.exe

aes.plain

Targets

    • Target

      Solara.exe

    • Size

      43KB

    • MD5

      a5c594f36fccf6f04552fd2ef8cca82a

    • SHA1

      654fd3bbe89442840010a7cbeccb2346adb0c2d1

    • SHA256

      b3448f4ae8060638bdad47bc3000afd0d5980fe66e09b6b64ae9da9134dcd9b5

    • SHA512

      a66c8ee6212235006b969148a37bc47b4715ef276bd632581c80a39b28f565f5c12235c315ba78e1e251d7c51126af0bd6e2ea32b087616edf595665538a142e

    • SSDEEP

      768:OAoPDwgJOSpuqldThkwh77RXk6mJomGSvFFRPa9Kb6POChgOObKY:OVDwgJOSp7ZvZu19dFA9Kb6POCSHGY

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks