General

  • Target

    f6809a32647a759cb5a171a13850cd2c62dfe6409dd8766066fc8950795bb21fN.exe

  • Size

    83KB

  • Sample

    250121-kadyksvmht

  • MD5

    31490196d04d08f16caec6fb9f227360

  • SHA1

    0ceabbf06050eac442ff5340429fbea9ae7419e7

  • SHA256

    f6809a32647a759cb5a171a13850cd2c62dfe6409dd8766066fc8950795bb21f

  • SHA512

    f1a1605d084c0e2c5ff24a7c5bd7f3197dd3f8bed344afec38015f051380d5b4928ba1ec68e8f1348f6f2ea247e1292d4caf95a7b71fa1668de7f35169b3b79d

  • SSDEEP

    1536:KOItpoEucVEhr9AOlcQQn8YTlbrfikUSNG6eqhyOXcY1VA3:TBEfefAOlHQ8YTlbrfi7SN2qYOXcYM3

Malware Config

Extracted

Family

xworm

C2

primary-organizing.gl.at.ply.gg:16003

Attributes
  • Install_directory

    %AppData%

  • install_file

    System.exe

Targets

    • Target

      f6809a32647a759cb5a171a13850cd2c62dfe6409dd8766066fc8950795bb21fN.exe

    • Size

      83KB

    • MD5

      31490196d04d08f16caec6fb9f227360

    • SHA1

      0ceabbf06050eac442ff5340429fbea9ae7419e7

    • SHA256

      f6809a32647a759cb5a171a13850cd2c62dfe6409dd8766066fc8950795bb21f

    • SHA512

      f1a1605d084c0e2c5ff24a7c5bd7f3197dd3f8bed344afec38015f051380d5b4928ba1ec68e8f1348f6f2ea247e1292d4caf95a7b71fa1668de7f35169b3b79d

    • SSDEEP

      1536:KOItpoEucVEhr9AOlcQQn8YTlbrfikUSNG6eqhyOXcY1VA3:TBEfefAOlHQ8YTlbrfi7SN2qYOXcYM3

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks