General

  • Target

    svchost.exe

  • Size

    74KB

  • Sample

    250119-etjqaawlhn

  • MD5

    31fc055df1031a064f93fb32fedb1102

  • SHA1

    bd7c77edba60504dd17085eb99f9486185a59925

  • SHA256

    9dc9b2e78ea2fb6b99b8366123315d73f6097abc59514a5456da61b4dbbe9ecc

  • SHA512

    baf46d849c32c2399d169e508a2fb5fd0e38c22ce0b3d85a1f62520dfd4335cbae5b42002d9a0b5f1b7e496a3cc7c02474eccd1a4475cafb3f55706cbe330daa

  • SSDEEP

    1536:8LgUO5QAWo3oV0sZW3aE3i3kb4a7Saxu6hxOAKSc8f4Q:8LgfGcoVo33bbNnxLOLSc8gQ

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:55299

road-stars.gl.at.ply.gg:55299

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

Targets

    • Target

      svchost.exe

    • Size

      74KB

    • MD5

      31fc055df1031a064f93fb32fedb1102

    • SHA1

      bd7c77edba60504dd17085eb99f9486185a59925

    • SHA256

      9dc9b2e78ea2fb6b99b8366123315d73f6097abc59514a5456da61b4dbbe9ecc

    • SHA512

      baf46d849c32c2399d169e508a2fb5fd0e38c22ce0b3d85a1f62520dfd4335cbae5b42002d9a0b5f1b7e496a3cc7c02474eccd1a4475cafb3f55706cbe330daa

    • SSDEEP

      1536:8LgUO5QAWo3oV0sZW3aE3i3kb4a7Saxu6hxOAKSc8f4Q:8LgfGcoVo33bbNnxLOLSc8gQ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks