General

  • Target

    5d23561aa4fb0eea26e365b79c09c503643877fe4084647f99132c8b4a425c09N.exe

  • Size

    49KB

  • Sample

    250120-n3grqaxpft

  • MD5

    4e5ba87d709a29a1d916192cf460de70

  • SHA1

    79acd66d658dcb635d994fb8c135455abc0f69f8

  • SHA256

    5d23561aa4fb0eea26e365b79c09c503643877fe4084647f99132c8b4a425c09

  • SHA512

    88a41839d9933b495be4e1da46b05d7cb20d8207b2ed615af1f8a88a2c005e0094ff1ad5fbd81191ee8f191b2e432b0b457d3d8107d9f347bd06e59a339da353

  • SSDEEP

    1536:G4TlXi94kgMLEhNkoyIWwClDVC9D2XPs9H:F5Xz3MYuwV9QPsZ

Malware Config

Extracted

Family

xworm

Mutex

WDJjJwZM6N0epwZX

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      5d23561aa4fb0eea26e365b79c09c503643877fe4084647f99132c8b4a425c09N.exe

    • Size

      49KB

    • MD5

      4e5ba87d709a29a1d916192cf460de70

    • SHA1

      79acd66d658dcb635d994fb8c135455abc0f69f8

    • SHA256

      5d23561aa4fb0eea26e365b79c09c503643877fe4084647f99132c8b4a425c09

    • SHA512

      88a41839d9933b495be4e1da46b05d7cb20d8207b2ed615af1f8a88a2c005e0094ff1ad5fbd81191ee8f191b2e432b0b457d3d8107d9f347bd06e59a339da353

    • SSDEEP

      1536:G4TlXi94kgMLEhNkoyIWwClDVC9D2XPs9H:F5Xz3MYuwV9QPsZ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks