General

  • Target

    72d1c1095c58dac49282ff54d3ca3b7a927681e2a56d5e09e90cabcf48118fa3N.exe

  • Size

    70KB

  • Sample

    241220-ajzxasvkdn

  • MD5

    cb23e666cb32131891973871950f8080

  • SHA1

    ee3223b5ace61c7e111d21f986b8e3cef73cdd11

  • SHA256

    72d1c1095c58dac49282ff54d3ca3b7a927681e2a56d5e09e90cabcf48118fa3

  • SHA512

    aeb329ba7285a822b39be4794720fd57caaa4535d26ee98ba660862ef17e46aa93b70a1d6a415ad1e685d5cd9187cfe97c9a018d0ee63472b2caade3b75ab7ae

  • SSDEEP

    1536:DsYRmYACQFrxIHmT7OMbEG7nKENiCD6+45xOGvLUuxqO:DZJj4dIHudbEdIz6xOGvLEO

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:33795

includes-confident.gl.at.ply.gg:33795

Attributes
  • Install_directory

    %AppData%

  • install_file

    online-fix.exe

Targets

    • Target

      72d1c1095c58dac49282ff54d3ca3b7a927681e2a56d5e09e90cabcf48118fa3N.exe

    • Size

      70KB

    • MD5

      cb23e666cb32131891973871950f8080

    • SHA1

      ee3223b5ace61c7e111d21f986b8e3cef73cdd11

    • SHA256

      72d1c1095c58dac49282ff54d3ca3b7a927681e2a56d5e09e90cabcf48118fa3

    • SHA512

      aeb329ba7285a822b39be4794720fd57caaa4535d26ee98ba660862ef17e46aa93b70a1d6a415ad1e685d5cd9187cfe97c9a018d0ee63472b2caade3b75ab7ae

    • SSDEEP

      1536:DsYRmYACQFrxIHmT7OMbEG7nKENiCD6+45xOGvLUuxqO:DZJj4dIHudbEdIz6xOGvLEO

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks