General

  • Target

    FIX.exe

  • Size

    70KB

  • Sample

    250119-wzl62azlbt

  • MD5

    a4dcdcdfbb5ef68a0d9222618def90d2

  • SHA1

    8a04a046642eb1ab4ed640995c550467a1463d9a

  • SHA256

    95a032a1e79be0b8436651d2a8c3ff59253eb84c3972ac40ad39cb27fc5bb7f3

  • SHA512

    fd11cf69a87b8ec19cc5fb6e01e86dcd40e308425cb43173faf812d331b1571e51ab7f75d50e8be725d177ad7c68517b390bb1a17622befe2f1cf70c402e6a65

  • SSDEEP

    1536:DvKEG3MMvh0LPHlVKQWkxYJ+bLvGLip4WTs631n+OsB7qzjzqe3o:DvKEG3ML/KQZYJ+bLvRL+OsFIjOf

Malware Config

Extracted

Family

xworm

C2

exchange-syndicate.gl.at.ply.gg:22530

Attributes
  • install_file

    USB.exe

Targets

    • Target

      FIX.exe

    • Size

      70KB

    • MD5

      a4dcdcdfbb5ef68a0d9222618def90d2

    • SHA1

      8a04a046642eb1ab4ed640995c550467a1463d9a

    • SHA256

      95a032a1e79be0b8436651d2a8c3ff59253eb84c3972ac40ad39cb27fc5bb7f3

    • SHA512

      fd11cf69a87b8ec19cc5fb6e01e86dcd40e308425cb43173faf812d331b1571e51ab7f75d50e8be725d177ad7c68517b390bb1a17622befe2f1cf70c402e6a65

    • SSDEEP

      1536:DvKEG3MMvh0LPHlVKQWkxYJ+bLvGLip4WTs631n+OsB7qzjzqe3o:DvKEG3ML/KQZYJ+bLvRL+OsFIjOf

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks