General

  • Target

    idk.exe

  • Size

    78KB

  • Sample

    250122-rtxy5a1qdr

  • MD5

    662afd232c27ffeacb7e5e8659eeccec

  • SHA1

    3db0da6493cb893b06ae08380d118beeb15993bc

  • SHA256

    dd72847951db3e210cbd52e0d342f87dc7bbffbec60d7ed8d5f73aa63a0b36d3

  • SHA512

    42818adf68c7f5deec6e85bc70aea7428d85959391be9035e502cbe448d088375ea348886a6cac92542a67ac117cd52dbfe720ced89dcc97001cbc1761023135

  • SSDEEP

    1536:1pfrzPokYK9mUzEnTPJ5g6EKuKa36MSPoorfXr3ZoTH+aJWRTILUG:zLok9TzEnThFsJho5Nk4G

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

Targets

    • Target

      idk.exe

    • Size

      78KB

    • MD5

      662afd232c27ffeacb7e5e8659eeccec

    • SHA1

      3db0da6493cb893b06ae08380d118beeb15993bc

    • SHA256

      dd72847951db3e210cbd52e0d342f87dc7bbffbec60d7ed8d5f73aa63a0b36d3

    • SHA512

      42818adf68c7f5deec6e85bc70aea7428d85959391be9035e502cbe448d088375ea348886a6cac92542a67ac117cd52dbfe720ced89dcc97001cbc1761023135

    • SSDEEP

      1536:1pfrzPokYK9mUzEnTPJ5g6EKuKa36MSPoorfXr3ZoTH+aJWRTILUG:zLok9TzEnThFsJho5Nk4G

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks