General

  • Target

    VEN HEX.exe

  • Size

    2.1MB

  • Sample

    250121-tpyqzasjfs

  • MD5

    a697b45d558328d53b8f7c74268554f3

  • SHA1

    430805b32e81d91994f33c2515ce79055433f9e2

  • SHA256

    bbbd56026093c64936a368c723b12175330923741972d89c34699b77538d6e4c

  • SHA512

    a1365c320abecc466bf3ca171ba0bfc75c477597b86268f825200fcf8255d430f189641b333002103dbe927960bbde75509636a7ca9224bd2ac503348874dc76

  • SSDEEP

    49152:7e7JlfaddOPZc2gUpwUcDSBn9Iw+gGKRQ241PU:aTfkeBw3Y9Iw+gGK+1PU

Malware Config

Extracted

Family

xworm

C2

shown-newspapers.gl.at.ply.gg:35343

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      VEN HEX.exe

    • Size

      2.1MB

    • MD5

      a697b45d558328d53b8f7c74268554f3

    • SHA1

      430805b32e81d91994f33c2515ce79055433f9e2

    • SHA256

      bbbd56026093c64936a368c723b12175330923741972d89c34699b77538d6e4c

    • SHA512

      a1365c320abecc466bf3ca171ba0bfc75c477597b86268f825200fcf8255d430f189641b333002103dbe927960bbde75509636a7ca9224bd2ac503348874dc76

    • SSDEEP

      49152:7e7JlfaddOPZc2gUpwUcDSBn9Iw+gGKRQ241PU:aTfkeBw3Y9Iw+gGK+1PU

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks