General

  • Target

    vu809e.lzh

  • Size

    466KB

  • Sample

    250120-m7zbwswndl

  • MD5

    abff32a96bc509d0d39ccc9d17a618c4

  • SHA1

    e45c928d9deea8b7272472b25641668eef56b2da

  • SHA256

    7802d5ba1a55e070258c29be56b5cfada559cd462bf6ed5d6aa5804b06e46112

  • SHA512

    cff280be0250cc331f4dfee8ec385c6c5c25bfd922854160c09eb1b7a4518e64129ae9c21e9ac341d291fdda5458618d88361a052472e9f2feebbf18058add80

  • SSDEEP

    12288:gbal2FFtjAp91zHhjPLaR4rjEILdL9OcX1Yz:gGlmFKp/HpOKrH1Yz

Malware Config

Extracted

Family

xworm

Version

5.0

C2

dorismark81.duckdns.org:28503

Mutex

j2oLPi6pecBOp0er

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      NEW ORDER TEU (NT250214).exe

    • Size

      581KB

    • MD5

      3c3b62520e40870390b33f528a8f7619

    • SHA1

      c65f1ca358fcfbce3c1466bc47f3ed89c5d6d42a

    • SHA256

      a2f9f0e73da837b578ef0b58a3bec4795920201b81d82cdb873e3a5198bddb96

    • SHA512

      885aa492e0758099db0b631a3aa214a1cd81f42ffcd900b45293ea9a02fffd412b3fc2eb6579423a911335295d1726102b2381e4ce274e429f9193156de255a8

    • SSDEEP

      12288:n5t6WhRSUunDYbDI13hVE+z5fOsQneDOYoPo4RNEnOef58U/isUkR:P6NnDMDIN5IwfnB7isT

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks