General

  • Target

    Vxn Temp.exe

  • Size

    227KB

  • Sample

    241221-sk54tasjbp

  • MD5

    113dc4a4b84b9e0665ef6628062c157a

  • SHA1

    297f530f37ec6ddefb0ac724407c28fa2e143645

  • SHA256

    71656a0cf08d272b202d567d10e893ad1f783e1f91c25986574a7bb9f5f10796

  • SHA512

    654a35c3b21f37caafd1829bebdb79c6daeb62b969bca0e7b48338907938913e59bd66f5113def0756b284b83c09a04ca11eaeeb8c7ea68f322494d6264919c7

  • SSDEEP

    3072:zy1E7PGcVUZMb0D1v42cZ4vv+aZ+LcsvIsMslafgr4ESvze7PGzl5J5:zyQU20RvM4f+LZIs86457h5L

Malware Config

Extracted

Family

xworm

C2

side-sean.gl.at.ply.gg:37533

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    msedge.exe

Targets

    • Target

      Vxn Temp.exe

    • Size

      227KB

    • MD5

      113dc4a4b84b9e0665ef6628062c157a

    • SHA1

      297f530f37ec6ddefb0ac724407c28fa2e143645

    • SHA256

      71656a0cf08d272b202d567d10e893ad1f783e1f91c25986574a7bb9f5f10796

    • SHA512

      654a35c3b21f37caafd1829bebdb79c6daeb62b969bca0e7b48338907938913e59bd66f5113def0756b284b83c09a04ca11eaeeb8c7ea68f322494d6264919c7

    • SSDEEP

      3072:zy1E7PGcVUZMb0D1v42cZ4vv+aZ+LcsvIsMslafgr4ESvze7PGzl5J5:zyQU20RvM4f+LZIs86457h5L

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks