General

  • Target

    Infectedare.bat

  • Size

    370KB

  • Sample

    250121-2qt36svrcl

  • MD5

    e671e31016657dd61b18872fbfcfd772

  • SHA1

    2944b453f4e811ef50374b0de7a8eec3fd056245

  • SHA256

    f1114a9029232440f9a4ffe7590772b4f7e331858a0654667239c480d1891083

  • SHA512

    3ed8b4bdb0beb9c85ae10ae41b26efa103c0e789389547a2c4cc1e459d70cf6a83a3c69d448ad0a913721395acb82908ab64c6967e7103a445665f75b7410568

  • SSDEEP

    6144:O87ZMusUnaeMl3lQS6v0hD6FJn1PKhCTy4hshu0gClRQXK0U:OwVHnL0lQFG671iPs2Q6J

Malware Config

Extracted

Family

xworm

Version

5.0

C2

real-enquiry.gl.at.ply.gg:15403

Mutex

Twor9QJPgxqGUGz9

Attributes
  • Install_directory

    %Public%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Infectedare.bat

    • Size

      370KB

    • MD5

      e671e31016657dd61b18872fbfcfd772

    • SHA1

      2944b453f4e811ef50374b0de7a8eec3fd056245

    • SHA256

      f1114a9029232440f9a4ffe7590772b4f7e331858a0654667239c480d1891083

    • SHA512

      3ed8b4bdb0beb9c85ae10ae41b26efa103c0e789389547a2c4cc1e459d70cf6a83a3c69d448ad0a913721395acb82908ab64c6967e7103a445665f75b7410568

    • SSDEEP

      6144:O87ZMusUnaeMl3lQS6v0hD6FJn1PKhCTy4hshu0gClRQXK0U:OwVHnL0lQFG671iPs2Q6J

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks