General

  • Target

    XWorm.rar

  • Size

    15.2MB

  • Sample

    250118-2hapkaxkbt

  • MD5

    b96de2151ce220f772ff79077da7930e

  • SHA1

    536b4e92e8fdb32da92b4e1d720c9312528c18c9

  • SHA256

    53c02ff543f5ebbf596f707a1a1feaade8c743eceb22d050d34c31d15d7a0ba1

  • SHA512

    5092fc68bbd7743d7f7f4ac5dab84db30b5f4f25002947db5d9f8b19dcc2df483b1f48a29f7f9bfa9a3ceddf83f54263ee6eb7f6dca21229bf5b9a97f39b9073

  • SSDEEP

    393216:lyatTe39n3198f0xuUdHHGh9Ys6TSBc36PzRhn88LMkV:lyL3hH8fMlZ+W+BcqPzRhSkV

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:55967

ca-assessing.gl.at.ply.gg:55967

Mutex

0VAbVWRVWwPHtkmk

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XWorm/XWorm 5.6.exe

    • Size

      40KB

    • MD5

      496c3225443deab6949914cd224046f4

    • SHA1

      18b75bbac53042d66ccddb565e3a5a8547cc563f

    • SHA256

      875d88c284b312b7858c2fd2b683036c16f9f914bce35ca8fa87ccfb2db202be

    • SHA512

      2d7c2436244bd5d5908cdae5ec7dae1ef10eae421204c48dfcce77162d0b8a3fb90a6a9acfc9a310d30b241b62b0e79a7464503fff873cf73f331b8d20bd9dec

    • SSDEEP

      768:CNZ4ZV7QMND9Pf7PnDPItE9/JF5Py9Ovzf6SOMhS33iP:My7Qo1TPnDP5xFs9C76SOMIW

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks