General

  • Target

    loader_prod.exe

  • Size

    28.0MB

  • Sample

    250121-pwkepsvjdl

  • MD5

    d244b2e378b22823e7b953f4fddd0b70

  • SHA1

    5bbdb1e4fa0a755164de0f969089324160252d83

  • SHA256

    d0b344845672d414f7041eabc40b0c0976749cd815ec1d1862e1e038a40c0dbe

  • SHA512

    5b17e1b13ea8f0b112cdb0bc246478ebb4040fe3371ef135ab44854a2b4558754fca3814aced057b2b77eb4058dcd39862e0a509a4cec76f771e101ead22b6de

  • SSDEEP

    3072:51KuNrpH21CHLt9GMCbHlPXAhEU3xZ6vvPs8:51hX21uLXd2SmKbcvP

Malware Config

Extracted

Family

xworm

C2

trip-thesaurus.gl.at.ply.gg:16715

rates-sir.gl.at.ply.gg:9099

Attributes
  • Install_directory

    %AppData%

  • install_file

    SecurityHealthSystray.exe

Targets

    • Target

      loader_prod.exe

    • Size

      28.0MB

    • MD5

      d244b2e378b22823e7b953f4fddd0b70

    • SHA1

      5bbdb1e4fa0a755164de0f969089324160252d83

    • SHA256

      d0b344845672d414f7041eabc40b0c0976749cd815ec1d1862e1e038a40c0dbe

    • SHA512

      5b17e1b13ea8f0b112cdb0bc246478ebb4040fe3371ef135ab44854a2b4558754fca3814aced057b2b77eb4058dcd39862e0a509a4cec76f771e101ead22b6de

    • SSDEEP

      3072:51KuNrpH21CHLt9GMCbHlPXAhEU3xZ6vvPs8:51hX21uLXd2SmKbcvP

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks