General

  • Target

    SamsungCommisonforgbz.rar

  • Size

    98KB

  • Sample

    250122-rzrz3asjfr

  • MD5

    9330d37c4bcf02a000ffe70aa5720230

  • SHA1

    a8994e89130edf420de677ff38e075a40ad28d3a

  • SHA256

    3c2bfb840a89298362078051b0b0090acb291298cfa3189572ecdc954baaed0f

  • SHA512

    0eb4079be6b705e47d342765bb96f96ca8cd916e86502fe321327c29144e9e0ffea9603723861536b02db137dbf3cb9a4bab56567e362138405d79365489647a

  • SSDEEP

    3072:uSJOBvUkaczRfb6iTYW5jdFtfSqCpv3S/1i:uaOVPJPT3fSqChSNi

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:24707

modified-begun.gl.at.ply.gg:24707

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      SamsungCommisonforgbz.rar

    • Size

      98KB

    • MD5

      9330d37c4bcf02a000ffe70aa5720230

    • SHA1

      a8994e89130edf420de677ff38e075a40ad28d3a

    • SHA256

      3c2bfb840a89298362078051b0b0090acb291298cfa3189572ecdc954baaed0f

    • SHA512

      0eb4079be6b705e47d342765bb96f96ca8cd916e86502fe321327c29144e9e0ffea9603723861536b02db137dbf3cb9a4bab56567e362138405d79365489647a

    • SSDEEP

      3072:uSJOBvUkaczRfb6iTYW5jdFtfSqCpv3S/1i:uaOVPJPT3fSqChSNi

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks