General

  • Target

    rat test.exe

  • Size

    69KB

  • Sample

    250119-bas8tszpa1

  • MD5

    59eb60dd98cdf74da6285b2253aaa71e

  • SHA1

    eb8e7cabf1643b8fcb10b61479e7af01d6438a92

  • SHA256

    acde7c8b874d94dcc71b696b356d13f54a7c3b848b160a196979feea61d35f04

  • SHA512

    8ecd6a7e972d4fab01c79fc9b068e7f2cf879c56d52016c25dff71ca9b217c4a82fd330f8ab008113a95835e82e2f12f265f42326d6fbe1b991ad1a3d248a185

  • SSDEEP

    1536:2T5btPKoUfwcaQWa5bQChtIF6vcCO/18+rdlt7:I8aQWqbQC0QcCO/fdD

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:21252

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    USB.exe

Targets

    • Target

      rat test.exe

    • Size

      69KB

    • MD5

      59eb60dd98cdf74da6285b2253aaa71e

    • SHA1

      eb8e7cabf1643b8fcb10b61479e7af01d6438a92

    • SHA256

      acde7c8b874d94dcc71b696b356d13f54a7c3b848b160a196979feea61d35f04

    • SHA512

      8ecd6a7e972d4fab01c79fc9b068e7f2cf879c56d52016c25dff71ca9b217c4a82fd330f8ab008113a95835e82e2f12f265f42326d6fbe1b991ad1a3d248a185

    • SSDEEP

      1536:2T5btPKoUfwcaQWa5bQChtIF6vcCO/18+rdlt7:I8aQWqbQC0QcCO/fdD

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks