General

  • Target

    33333.exe

  • Size

    90KB

  • Sample

    250119-gckblayjgp

  • MD5

    e10791416cbe4bd094d22476f1e0d067

  • SHA1

    9e86515eb7e5b3fd7adfc52db9508adc61c29cd8

  • SHA256

    54a6342541cb80a9e801ce48de755ab5dfb1931e2afdf9ae55714f502c9b09e4

  • SHA512

    34cdc3c5f152dc27e1ff07311264fcebb250e8125d3a4cf7a02797a16bb48dea4ecfc3de88d46a439481ca80d54fe5f0e4964206a5a00bf665a0bdeac5df9e9b

  • SSDEEP

    1536:K+yL5gAxHwKKXHWsjTv5RHWvcbJMP7CesjBD6DrWWmPOrVYTSdBc:el9OWs3WkbJsTs+CPOrVWuc

Malware Config

Extracted

Family

xworm

C2

virtual-pointed.gl.at.ply.gg:17000

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      33333.exe

    • Size

      90KB

    • MD5

      e10791416cbe4bd094d22476f1e0d067

    • SHA1

      9e86515eb7e5b3fd7adfc52db9508adc61c29cd8

    • SHA256

      54a6342541cb80a9e801ce48de755ab5dfb1931e2afdf9ae55714f502c9b09e4

    • SHA512

      34cdc3c5f152dc27e1ff07311264fcebb250e8125d3a4cf7a02797a16bb48dea4ecfc3de88d46a439481ca80d54fe5f0e4964206a5a00bf665a0bdeac5df9e9b

    • SSDEEP

      1536:K+yL5gAxHwKKXHWsjTv5RHWvcbJMP7CesjBD6DrWWmPOrVYTSdBc:el9OWs3WkbJsTs+CPOrVWuc

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks