General

  • Target

    13cbc690202bd7f229b813662711205361e63409057d5756859d560026698d11N.exe

  • Size

    64KB

  • Sample

    241203-tt7vfaylgj

  • MD5

    0893b12cf7899e969bc6d094f13395c0

  • SHA1

    0fb0e47ae981a3fcb02a0f0c366f1754e9f05ff8

  • SHA256

    13cbc690202bd7f229b813662711205361e63409057d5756859d560026698d11

  • SHA512

    891edbc54976cadcdcdccd586be39e36fc297adf5b56fc09602d99700c45a01ceec363b6f2301100880666c682eb342bf48b5f0c33bc7004572be5a52aef447a

  • SSDEEP

    1536:+EVRBKXfmrbLO+BBUsbJU5fRqw6LCLOO4wH:RVRwunLbHbJUNYoOOrH

Malware Config

Extracted

Family

xworm

C2

disclaimer-hose.gl.at.ply.gg:11906

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    Microsoft Edge.exe

Targets

    • Target

      13cbc690202bd7f229b813662711205361e63409057d5756859d560026698d11N.exe

    • Size

      64KB

    • MD5

      0893b12cf7899e969bc6d094f13395c0

    • SHA1

      0fb0e47ae981a3fcb02a0f0c366f1754e9f05ff8

    • SHA256

      13cbc690202bd7f229b813662711205361e63409057d5756859d560026698d11

    • SHA512

      891edbc54976cadcdcdccd586be39e36fc297adf5b56fc09602d99700c45a01ceec363b6f2301100880666c682eb342bf48b5f0c33bc7004572be5a52aef447a

    • SSDEEP

      1536:+EVRBKXfmrbLO+BBUsbJU5fRqw6LCLOO4wH:RVRwunLbHbJUNYoOOrH

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks