General

  • Target

    vson I temp.exe

  • Size

    15.6MB

  • Sample

    250120-vez2qazjan

  • MD5

    328e91dbd965eb1f0902080bc81df413

  • SHA1

    7a049c89f8fd79f0b91e12bdff17affd2066e403

  • SHA256

    11ea437ffb781fc9b93a6dfda275736ee591c14dfb860aa165a357974e90a352

  • SHA512

    1e7e40e54db78ac7d78eccf98d6c34a6f70c29639c010c8512ffa56f06755bc445c161d990913ca2299ae3602f474b4aa0b34fd5fd728f9a473745aeacb4ce3e

  • SSDEEP

    393216:nTvw6H8s1QzwNUJVtoMATyVchl49o1SrBqqxSlUa+PMsw6E3sSwr0DN:nJcJwCJEM7Vcf49LwUa+PDEsP0N

Malware Config

Extracted

Family

xworm

C2

45.88.91.79:1111

Attributes
  • Install_directory

    %AppData%

  • install_file

    Update.exe

Targets

    • Target

      vson I temp.exe

    • Size

      15.6MB

    • MD5

      328e91dbd965eb1f0902080bc81df413

    • SHA1

      7a049c89f8fd79f0b91e12bdff17affd2066e403

    • SHA256

      11ea437ffb781fc9b93a6dfda275736ee591c14dfb860aa165a357974e90a352

    • SHA512

      1e7e40e54db78ac7d78eccf98d6c34a6f70c29639c010c8512ffa56f06755bc445c161d990913ca2299ae3602f474b4aa0b34fd5fd728f9a473745aeacb4ce3e

    • SSDEEP

      393216:nTvw6H8s1QzwNUJVtoMATyVchl49o1SrBqqxSlUa+PMsw6E3sSwr0DN:nJcJwCJEM7Vcf49LwUa+PDEsP0N

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks