General

  • Target

    Phantom.exe

  • Size

    1.9MB

  • Sample

    250119-3czbea1kdl

  • MD5

    b2b18261a9e3f160e38c4a03f12b2204

  • SHA1

    ba1ec3b154d6071c068a00408bfb9599d500c18c

  • SHA256

    c97e3198e1c30dec6a40160c6784a3580e2893f1fd542fdbd67c3ae4447fda46

  • SHA512

    2f469790c80291db2907f4eef383cf8054b4fa8bd9074871b0a76d935e250bda729ab7ed9e284181c760333eac01855e070a2c35b3eeea5e9f80c5c816b992e3

  • SSDEEP

    24576:JFiGXkKK64/ZmydQcglGE0h59XZPHzNuoiH6Kcejbur2+ofUyVZ/Sb6lJ:JMGUbv9QGE8jX1zNuo06v2+fASmlJ

Malware Config

Extracted

Family

xworm

C2

109.176.252.16:80

109.176.252.16:80:80

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    WinReg32.exe

Targets

    • Target

      Phantom.exe

    • Size

      1.9MB

    • MD5

      b2b18261a9e3f160e38c4a03f12b2204

    • SHA1

      ba1ec3b154d6071c068a00408bfb9599d500c18c

    • SHA256

      c97e3198e1c30dec6a40160c6784a3580e2893f1fd542fdbd67c3ae4447fda46

    • SHA512

      2f469790c80291db2907f4eef383cf8054b4fa8bd9074871b0a76d935e250bda729ab7ed9e284181c760333eac01855e070a2c35b3eeea5e9f80c5c816b992e3

    • SSDEEP

      24576:JFiGXkKK64/ZmydQcglGE0h59XZPHzNuoiH6Kcejbur2+ofUyVZ/Sb6lJ:JMGUbv9QGE8jX1zNuo06v2+fASmlJ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks