General

  • Target

    spoofer test.7z

  • Size

    50KB

  • Sample

    241204-ss785svmbp

  • MD5

    8b3a44d1922c7266bc6ef1e8678411a5

  • SHA1

    ebf3cb0418459364ba1b6c11911aaca37db96237

  • SHA256

    65975962e36d40cc5df6bbd46468e7eea057dbf0a5d736a5b09ca9fb86f76e69

  • SHA512

    13b4fa66c9fdbbbb911351e0e4090c56e686a8f8880ea32bba839620666c15df62e8e3fbd2993897caf2a4e4395a1f1123dcc22576a1bd048b09da6ce3a19eff

  • SSDEEP

    1536:DFwJbKfTJvHdEGWe1xa0CgJVaJmNPIHWf:pwJbMTN+Aq0CiM2Pzf

Malware Config

Extracted

Family

xworm

C2

six-usb.gl.at.ply.gg:49722

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    System User.exe

Targets

    • Target

      spoofer test.7z

    • Size

      50KB

    • MD5

      8b3a44d1922c7266bc6ef1e8678411a5

    • SHA1

      ebf3cb0418459364ba1b6c11911aaca37db96237

    • SHA256

      65975962e36d40cc5df6bbd46468e7eea057dbf0a5d736a5b09ca9fb86f76e69

    • SHA512

      13b4fa66c9fdbbbb911351e0e4090c56e686a8f8880ea32bba839620666c15df62e8e3fbd2993897caf2a4e4395a1f1123dcc22576a1bd048b09da6ce3a19eff

    • SSDEEP

      1536:DFwJbKfTJvHdEGWe1xa0CgJVaJmNPIHWf:pwJbMTN+Aq0CiM2Pzf

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks