General

  • Target

    loader.exe

  • Size

    2.6MB

  • Sample

    250118-yqndvasmfx

  • MD5

    2b45969ccbd973f5bc6a10716093e00b

  • SHA1

    596467ce3d6a3a3a80abaca3b8df30a52c95ccab

  • SHA256

    fea9620c907c32bef37b6e5a08699eae88ecc0ee014e52495a39a46312d4766f

  • SHA512

    b985d5a73027e07519d8f180b6b87e1b95f6a5185dc279db783f3c6f5e788b0bb9279f74bd4bb1a52fb766970d34a0e2a3a67446fd825f70d68981ef77264578

  • SSDEEP

    49152:Uhsk/i2lNbPzoc9MmJdW8zo7UqT31p+/JLD9bC8N1FIZfIUzon0KW6My0+:gni2lRoNYo7DT3m/JL5bCCEbo0KW6

Malware Config

Extracted

Family

xworm

C2

185.94.29.228:4444

Attributes
  • Install_directory

    %Temp%

  • install_file

    Spotify.exe

Targets

    • Target

      loader.exe

    • Size

      2.6MB

    • MD5

      2b45969ccbd973f5bc6a10716093e00b

    • SHA1

      596467ce3d6a3a3a80abaca3b8df30a52c95ccab

    • SHA256

      fea9620c907c32bef37b6e5a08699eae88ecc0ee014e52495a39a46312d4766f

    • SHA512

      b985d5a73027e07519d8f180b6b87e1b95f6a5185dc279db783f3c6f5e788b0bb9279f74bd4bb1a52fb766970d34a0e2a3a67446fd825f70d68981ef77264578

    • SSDEEP

      49152:Uhsk/i2lNbPzoc9MmJdW8zo7UqT31p+/JLD9bC8N1FIZfIUzon0KW6My0+:gni2lRoNYo7DT3m/JL5bCCEbo0KW6

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks