General

  • Target

    amongys.exe

  • Size

    78KB

  • Sample

    250122-rsh4ks1pgn

  • MD5

    ac27e93eee9c6e2f3922cd874fd8a4f7

  • SHA1

    b571a07df2e9142094a16ba5fdb6c0b240518362

  • SHA256

    c66c187f9ad62af25514cd5cb0389ac62dd7f18c8de86554500a961a485f6ab3

  • SHA512

    58ed067f233f2f81e3872e01222d27b75390871c344f04ba577a7daa20beaa197677b5d75d1b4d605cd77f1ae2dc655d006db25dbab0d6f6ffdd134987cd187a

  • SSDEEP

    1536:U/lUh43+M1iaxGqX/fvJ64ycsW53pwZPjg3fO7a9Px//tB9:j7cXGqPfvJcgqQLPx//tB9

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

Targets

    • Target

      amongys.exe

    • Size

      78KB

    • MD5

      ac27e93eee9c6e2f3922cd874fd8a4f7

    • SHA1

      b571a07df2e9142094a16ba5fdb6c0b240518362

    • SHA256

      c66c187f9ad62af25514cd5cb0389ac62dd7f18c8de86554500a961a485f6ab3

    • SHA512

      58ed067f233f2f81e3872e01222d27b75390871c344f04ba577a7daa20beaa197677b5d75d1b4d605cd77f1ae2dc655d006db25dbab0d6f6ffdd134987cd187a

    • SSDEEP

      1536:U/lUh43+M1iaxGqX/fvJ64ycsW53pwZPjg3fO7a9Px//tB9:j7cXGqPfvJcgqQLPx//tB9

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks