General

  • Target

    Versal Open beta.zip

  • Size

    39KB

  • Sample

    241203-vrpfravmbz

  • MD5

    73485207d11eb8be4890c2fe614ca19f

  • SHA1

    8da62a34b0ad1ba1d76b80dd2814af75060ebe15

  • SHA256

    160104171f76a625bac4aabf4fa99bc7a6c1c145786ff5bb98a949e40053fdeb

  • SHA512

    e5286d2b2dd48e06ba480bb65f9d0328fa35f9d3cb56033c229fe755bc4a7bde33da9262c520e05a2b44347e966f3d8663300e1eac15ff2bac10508fe5375a1c

  • SSDEEP

    768:lDy9l0kputAkzHxHW4MzSKZ0nVtSQAhncWa/HOgM4xDKpfEi72KK:lDhkE5RHW49ttWncWa/OgMYwl2KK

Malware Config

Extracted

Family

xworm

C2

slipprz.duckdns.org:7214

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    win32services.exe

Targets

    • Target

      Versal Client Beta.exe

    • Size

      68KB

    • MD5

      3e7d64259b363be8f8d3ad5ce94943f4

    • SHA1

      7e2fa2fb30069c3a7ce3f523440497d30ff6164f

    • SHA256

      992fa7f194c76a9e6155a13ef849ae3fe55c3bd7954d3a08cff1719fdd16ae1b

    • SHA512

      cadd51b55ad4ee21ed3c21bc462d034122fb5068c5bd8b82e61f2019c72d70c01f7c3892c916da6b89c39ba73ff9e65e6f52115fac3abc929796194008f0fca4

    • SSDEEP

      1536:SDhdopFOmcMwSlUHbHzMiwO7EsxNbqFDAkIhQ+pnOhZ46+2dTR1:7OMjYbYiwv6NbqDXQnOPx+Y1

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks