General

  • Target

    Network.exe

  • Size

    226KB

  • Sample

    250122-gn6nza1qdz

  • MD5

    31c81fac210cd56abb84ff55ede0365b

  • SHA1

    ca8a86da38e111f01ad04c9c537162be2af5f842

  • SHA256

    f26dcdf460a3da96cedebca9baccca6947bea8f89e3a801118b9cd40da14bfa8

  • SHA512

    11d21b79a689a3689470e975d25247639c9a0eba266f70c8d5168b94a06975dc98537206cf753f9a436ee679969a9820f6ffa63fb15852ca05cf0fdf8fdf6eba

  • SSDEEP

    1536:vTtytp4hGT9/gEb8ATRf6VOSQmYqm3uzh+sh8tMI5loD+bhN/N5:vYQcKEb8bOSY3uz0sh8J5loDo/z

Malware Config

Extracted

Family

xworm

Version

3.1

C2

172.86.108.55:7771

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      Network.exe

    • Size

      226KB

    • MD5

      31c81fac210cd56abb84ff55ede0365b

    • SHA1

      ca8a86da38e111f01ad04c9c537162be2af5f842

    • SHA256

      f26dcdf460a3da96cedebca9baccca6947bea8f89e3a801118b9cd40da14bfa8

    • SHA512

      11d21b79a689a3689470e975d25247639c9a0eba266f70c8d5168b94a06975dc98537206cf753f9a436ee679969a9820f6ffa63fb15852ca05cf0fdf8fdf6eba

    • SSDEEP

      1536:vTtytp4hGT9/gEb8ATRf6VOSQmYqm3uzh+sh8tMI5loD+bhN/N5:vYQcKEb8bOSY3uz0sh8J5loDo/z

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks