General

  • Target

    LibraryDownload.exe

  • Size

    171KB

  • Sample

    241203-v48p6a1naj

  • MD5

    0f4733702f7441130c76f92271e33d52

  • SHA1

    962c64538ad4b11b0a57a269e726476eaf1e5cd4

  • SHA256

    b96640cb2a36f9bbaf48fe4798091068b9f518af783236e759763f2386f6a157

  • SHA512

    3718e10cdbb2dd1089a3cc4437c0884593ed0194953e0e0d6865b33475ffd2d8b9bcdffe5e8fade78eb4078b6777ca65618617a2563007b77998c273d85be0f5

  • SSDEEP

    3072:vOMQnN3iDf+bpT7E3ubGoOmaG8vwps/Bz65/M6If+3Js+3JFkKeTnu:vOnxwWboub+As/xBt25

Malware Config

Extracted

Family

xworm

C2

designed-paragraph.gl.at.ply.gg:6553

Attributes
  • Install_directory

    %AppData%

  • install_file

    OneDrive.exe

  • telegram

    https://api.telegram.org/bot7632521130:AAFUdxmN095QSre97Sy3YKm36m78BuQCg7g/sendMessage?chat_id=6370415730

Targets

    • Target

      LibraryDownload.exe

    • Size

      171KB

    • MD5

      0f4733702f7441130c76f92271e33d52

    • SHA1

      962c64538ad4b11b0a57a269e726476eaf1e5cd4

    • SHA256

      b96640cb2a36f9bbaf48fe4798091068b9f518af783236e759763f2386f6a157

    • SHA512

      3718e10cdbb2dd1089a3cc4437c0884593ed0194953e0e0d6865b33475ffd2d8b9bcdffe5e8fade78eb4078b6777ca65618617a2563007b77998c273d85be0f5

    • SSDEEP

      3072:vOMQnN3iDf+bpT7E3ubGoOmaG8vwps/Bz65/M6If+3Js+3JFkKeTnu:vOnxwWboub+As/xBt25

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks