General

  • Target

    691f6e3c-9102-4b60-a878-346573162d06.tmp

  • Size

    24.6MB

  • Sample

    250119-xqc3fa1rgm

  • MD5

    a083ae48ef54dd491872b9da1383730c

  • SHA1

    6c00f38f5e033273275e36c77a40955caa190a80

  • SHA256

    271beba7b37bad8ceb9b40f95ca7ac8076ff1c1670bc04825e78b0647ab25bbd

  • SHA512

    7c843395838afadc565705c3b6ee22f1dbc66ef6fbe195f9050a08936ba661425b9f9cb44adf91ef347b1d1481cfb11de9fed99f4132d30333c75a337b3146eb

  • SSDEEP

    786432:/3mbQPobZvANWHOR4YdRSbKZ+fnTkQfSzy:/3SoWuDjSpbZH

Malware Config

Extracted

Family

xworm

C2

tranny.racoongang.com:3389

174.89.155.190:3389

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      691f6e3c-9102-4b60-a878-346573162d06.tmp

    • Size

      24.6MB

    • MD5

      a083ae48ef54dd491872b9da1383730c

    • SHA1

      6c00f38f5e033273275e36c77a40955caa190a80

    • SHA256

      271beba7b37bad8ceb9b40f95ca7ac8076ff1c1670bc04825e78b0647ab25bbd

    • SHA512

      7c843395838afadc565705c3b6ee22f1dbc66ef6fbe195f9050a08936ba661425b9f9cb44adf91ef347b1d1481cfb11de9fed99f4132d30333c75a337b3146eb

    • SSDEEP

      786432:/3mbQPobZvANWHOR4YdRSbKZ+fnTkQfSzy:/3SoWuDjSpbZH

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks