General

  • Target

    Velocity_Free_Tweaking_Utility.bat

  • Size

    470KB

  • Sample

    250118-v722sayqgz

  • MD5

    368de487ff6ae5103c3307a2e0bed635

  • SHA1

    0147386ef6eaab1ead49b1c094df3cc68977a708

  • SHA256

    7761d40ba646d274001e0243148781fbc722a64546ea208c0ba597265dbf6417

  • SHA512

    7105f7bcf98fbb87ffcd9cae17e7cf4e7d3821724dce25a81f1a1e9c4bc24b69a1206dcb532a389759edeca33ce8283599d4bb73b353882dc5b76b47c126cab5

  • SSDEEP

    12288:MKvMPgbu1gDThxx0uXGQUKAVXqdeNi7KDJCU2iQQ/Qa4NnK:MKFa1gTqIlA4eNiWDJSHPK

Malware Config

Extracted

Family

xworm

C2

kitchen-alaska.gl.at.ply.gg:4964

Attributes
  • Install_directory

    %AppData%

  • install_file

    SubDir.exe

Targets

    • Target

      Velocity_Free_Tweaking_Utility.bat

    • Size

      470KB

    • MD5

      368de487ff6ae5103c3307a2e0bed635

    • SHA1

      0147386ef6eaab1ead49b1c094df3cc68977a708

    • SHA256

      7761d40ba646d274001e0243148781fbc722a64546ea208c0ba597265dbf6417

    • SHA512

      7105f7bcf98fbb87ffcd9cae17e7cf4e7d3821724dce25a81f1a1e9c4bc24b69a1206dcb532a389759edeca33ce8283599d4bb73b353882dc5b76b47c126cab5

    • SSDEEP

      12288:MKvMPgbu1gDThxx0uXGQUKAVXqdeNi7KDJCU2iQQ/Qa4NnK:MKFa1gTqIlA4eNiWDJSHPK

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks