General

  • Target

    08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348.exe

  • Size

    83KB

  • Sample

    250120-lzs98stpbp

  • MD5

    36939c097b21a057cd3cf29bd7d2e24c

  • SHA1

    2d120533e21e0f4a5154deb56d552613c51e5a78

  • SHA256

    08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348

  • SHA512

    77e477f3cf131949f028e18ed6fe4903cd744ca47250e4728faa2b29ba9afa2259be6cbf29ffea9cdd7be13966b58faa47c4408e11048a9bc9ef88c1ef7a0522

  • SSDEEP

    1536:KOItpoEucVEhr9AOlcQQn8YTlbrfikUSNG6eqhyOXcY1VA38:TBEfefAOlHQ8YTlbrfi7SN2qYOXcYM38

Malware Config

Extracted

Family

xworm

C2

primary-organizing.gl.at.ply.gg:16003

Attributes
  • Install_directory

    %AppData%

  • install_file

    System.exe

Targets

    • Target

      08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348.exe

    • Size

      83KB

    • MD5

      36939c097b21a057cd3cf29bd7d2e24c

    • SHA1

      2d120533e21e0f4a5154deb56d552613c51e5a78

    • SHA256

      08aaaa2767a0a4fd7eced1d065b7be7c0c67692b62b44bf4c69bf43bdbb9a348

    • SHA512

      77e477f3cf131949f028e18ed6fe4903cd744ca47250e4728faa2b29ba9afa2259be6cbf29ffea9cdd7be13966b58faa47c4408e11048a9bc9ef88c1ef7a0522

    • SSDEEP

      1536:KOItpoEucVEhr9AOlcQQn8YTlbrfikUSNG6eqhyOXcY1VA38:TBEfefAOlHQ8YTlbrfi7SN2qYOXcYM38

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks