General

  • Target

    หาที่อยู่ด้วยเอบร์.exe

  • Size

    8.7MB

  • Sample

    250122-ewffmsylhn

  • MD5

    1e936fe7c00a13a03d258247220333cb

  • SHA1

    0625868fe5e8541dca00a87b9dbc76e85a76a7a9

  • SHA256

    f21d3e6de139de0d92d8cdc675d7aa5693d375b1f075dee9deb664bf9961bacd

  • SHA512

    2f809796ebec18540570d9658742a91fb1ae42f44cd0193d7cd020a67f07dfc2f94740ed05aa1a12234063aa2173719953ee74203a794b94c7fc41a8037c5661

  • SSDEEP

    196608:yt20YhrbhcaAKkkdGDJtvMGn7+LCOGeosHnZouA7q:e2trlIKtdGDJCGgjBoEZouA

Malware Config

Extracted

Family

xworm

Version

5.0

C2

45.141.26.126:7000

Mutex

njhjW6ZcD4uLoqX9

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      หาที่อยู่ด้วยเอบร์.exe

    • Size

      8.7MB

    • MD5

      1e936fe7c00a13a03d258247220333cb

    • SHA1

      0625868fe5e8541dca00a87b9dbc76e85a76a7a9

    • SHA256

      f21d3e6de139de0d92d8cdc675d7aa5693d375b1f075dee9deb664bf9961bacd

    • SHA512

      2f809796ebec18540570d9658742a91fb1ae42f44cd0193d7cd020a67f07dfc2f94740ed05aa1a12234063aa2173719953ee74203a794b94c7fc41a8037c5661

    • SSDEEP

      196608:yt20YhrbhcaAKkkdGDJtvMGn7+LCOGeosHnZouA7q:e2trlIKtdGDJCGgjBoEZouA

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks