General

  • Target

    555.exe

  • Size

    73KB

  • Sample

    250120-fxpw5stkbp

  • MD5

    a419ffb32ad6422938129688d39a898f

  • SHA1

    303695e2f43566685c568ca670133b0d717eabcf

  • SHA256

    96d7f2474c300d7f24cd2635f03d52fe40964a030787d9e84dd1fedbb5618691

  • SHA512

    6a145de4ee6d26b1ee8be5cc22f7888291b8544ea8323f425da8ecfafdf79d961164ddd3c3eaf5a5d7abaa6208e5539c2ea8d2685440e81c6eea2248f8552e9f

  • SSDEEP

    1536:v2oktWbR7i2wiOXObYzDVSUbLUSsr36xOwGZtadQAa:v2ocs7iaOebHUbLGcOwGCdfa

Malware Config

Extracted

Family

xworm

C2

house-jungle.gl.at.ply.gg:14868

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

Targets

    • Target

      555.exe

    • Size

      73KB

    • MD5

      a419ffb32ad6422938129688d39a898f

    • SHA1

      303695e2f43566685c568ca670133b0d717eabcf

    • SHA256

      96d7f2474c300d7f24cd2635f03d52fe40964a030787d9e84dd1fedbb5618691

    • SHA512

      6a145de4ee6d26b1ee8be5cc22f7888291b8544ea8323f425da8ecfafdf79d961164ddd3c3eaf5a5d7abaa6208e5539c2ea8d2685440e81c6eea2248f8552e9f

    • SSDEEP

      1536:v2oktWbR7i2wiOXObYzDVSUbLUSsr36xOwGZtadQAa:v2ocs7iaOebHUbLGcOwGCdfa

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks