General

  • Target

    7802d5ba1a55e070258c29be56b5cfada559cd462bf6ed5d6aa5804b06e46112.lzh

  • Size

    466KB

  • Sample

    250121-drn2jstmb1

  • MD5

    abff32a96bc509d0d39ccc9d17a618c4

  • SHA1

    e45c928d9deea8b7272472b25641668eef56b2da

  • SHA256

    7802d5ba1a55e070258c29be56b5cfada559cd462bf6ed5d6aa5804b06e46112

  • SHA512

    cff280be0250cc331f4dfee8ec385c6c5c25bfd922854160c09eb1b7a4518e64129ae9c21e9ac341d291fdda5458618d88361a052472e9f2feebbf18058add80

  • SSDEEP

    12288:gbal2FFtjAp91zHhjPLaR4rjEILdL9OcX1Yz:gGlmFKp/HpOKrH1Yz

Malware Config

Extracted

Family

xworm

Version

5.0

C2

dorismark81.duckdns.org:28503

Mutex

j2oLPi6pecBOp0er

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain
1
5CLuGhMkQlM994H9lY53lQ==

Targets

    • Target

      NEW ORDER TEU (NT250214).exe

    • Size

      581KB

    • MD5

      3c3b62520e40870390b33f528a8f7619

    • SHA1

      c65f1ca358fcfbce3c1466bc47f3ed89c5d6d42a

    • SHA256

      a2f9f0e73da837b578ef0b58a3bec4795920201b81d82cdb873e3a5198bddb96

    • SHA512

      885aa492e0758099db0b631a3aa214a1cd81f42ffcd900b45293ea9a02fffd412b3fc2eb6579423a911335295d1726102b2381e4ce274e429f9193156de255a8

    • SSDEEP

      12288:n5t6WhRSUunDYbDI13hVE+z5fOsQneDOYoPo4RNEnOef58U/isUkR:P6NnDMDIN5IwfnB7isT

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.