General

  • Target

    11.exe

  • Size

    141KB

  • Sample

    250122-cgjteasqem

  • MD5

    ca2750660e7a4925be67111398c41ba3

  • SHA1

    c34ad86ab7d09eb561ea93d3043c50501b59a95a

  • SHA256

    f6ea483197e1068338d1a9f15f30acd504592e233ed48c99a3ec2d0bff4bfe07

  • SHA512

    ff8a1f0df2e14b662c6947ccafc87587edd22f50dd52f5e1af309c457d321aa5c46bdbfeafdd8aeee4b05403550892d3facba88b03bc700b5e19593046307553

  • SSDEEP

    3072:L507+DpnZ7oDJX6AyU0Rc4OSSIfO0mZxQeUF53Gbph1s27T:u72zMVqgWc4btfO02xi/Gbph1R7T

Malware Config

Extracted

Family

xworm

Version

5.0

C2

y-9.qq-weixin.org:7000

Mutex

EO9XSpj51dU3wDN4

Attributes
  • Install_directory

    %AppData%

  • install_file

    escsvc.exe

aes.plain

Targets

    • Target

      11.exe

    • Size

      141KB

    • MD5

      ca2750660e7a4925be67111398c41ba3

    • SHA1

      c34ad86ab7d09eb561ea93d3043c50501b59a95a

    • SHA256

      f6ea483197e1068338d1a9f15f30acd504592e233ed48c99a3ec2d0bff4bfe07

    • SHA512

      ff8a1f0df2e14b662c6947ccafc87587edd22f50dd52f5e1af309c457d321aa5c46bdbfeafdd8aeee4b05403550892d3facba88b03bc700b5e19593046307553

    • SSDEEP

      3072:L507+DpnZ7oDJX6AyU0Rc4OSSIfO0mZxQeUF53Gbph1s27T:u72zMVqgWc4btfO02xi/Gbph1R7T

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks