General

  • Target

    eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe

  • Size

    2.8MB

  • Sample

    241204-ege7bswmam

  • MD5

    abd473026ff01a89544052f0b7a437f0

  • SHA1

    114aa2653ad093ca5964a798333407eaa5e2a35b

  • SHA256

    eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783

  • SHA512

    3156af297e868ddf200efb1e8334959755ba6563447510472699ad282ad3503c04060d6faf0b6c4c429e8b71bf60fb7015c4e720df18360107ad5489126b8a21

  • SSDEEP

    49152:95VWQ4h1EtbHYF4PGVHX9gWX9cPpmnUr+Syx+UQ498iEjEv/6p3BVR5:9FjtbO4PCtDKpohbx+b4aHA/QHr

Malware Config

Extracted

Family

xworm

C2

canada-nervous.gl.at.ply.gg:26681

Attributes
  • Install_directory

    %AppData%

  • install_file

    scvhost.exe

  • telegram

    https://api.telegram.org/bot7556258236:AAFbbPTNmGub8pdNz3R3W7xxukN43pvt5Tc/sendMessage?chat_id=7191221522

Targets

    • Target

      eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe

    • Size

      2.8MB

    • MD5

      abd473026ff01a89544052f0b7a437f0

    • SHA1

      114aa2653ad093ca5964a798333407eaa5e2a35b

    • SHA256

      eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783

    • SHA512

      3156af297e868ddf200efb1e8334959755ba6563447510472699ad282ad3503c04060d6faf0b6c4c429e8b71bf60fb7015c4e720df18360107ad5489126b8a21

    • SSDEEP

      49152:95VWQ4h1EtbHYF4PGVHX9gWX9cPpmnUr+Syx+UQ498iEjEv/6p3BVR5:9FjtbO4PCtDKpohbx+b4aHA/QHr

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks