General

  • Target

    3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe

  • Size

    335KB

  • Sample

    250120-cqntqawnfy

  • MD5

    2e01c152b22c13fb946c204b6875a2d8

  • SHA1

    20f7a049f779623a11b4fbfb300c1f7a380fb33b

  • SHA256

    3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5

  • SHA512

    80dc80d22ecb90d3c58c40e112de882548a1d933937d851993af4e6a92746900283770bd09d88047bd79fa053600113d1f9bb42a6af5beefe00b3ee15d4e7310

  • SSDEEP

    6144:MEbVUO1x/5bTgVziHzZnSKrCbYMJAbB8+q:lr/5/gVziHlBrCbYx83

Malware Config

Extracted

Family

xworm

Mutex

yNحكـX8ٍبAGLWِF6Jo2DiObلٍLZا3ا

Attributes
  • Install_directory

    %Port%

  • install_file

    MicrosoftEdgeUpdateTaskMachineUAC.exe

aes.plain

Targets

    • Target

      3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe

    • Size

      335KB

    • MD5

      2e01c152b22c13fb946c204b6875a2d8

    • SHA1

      20f7a049f779623a11b4fbfb300c1f7a380fb33b

    • SHA256

      3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5

    • SHA512

      80dc80d22ecb90d3c58c40e112de882548a1d933937d851993af4e6a92746900283770bd09d88047bd79fa053600113d1f9bb42a6af5beefe00b3ee15d4e7310

    • SSDEEP

      6144:MEbVUO1x/5bTgVziHzZnSKrCbYMJAbB8+q:lr/5/gVziHlBrCbYx83

    • Detect Xworm Payload

    • Modifies security service

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks