General

  • Target

    UnamBinder.exe

  • Size

    9.6MB

  • Sample

    250122-s3bb6asrhw

  • MD5

    18c98c616674081b1910103b30ff697a

  • SHA1

    37daea3f1cba0fe605996a3f456897a7bcf7dcdf

  • SHA256

    de902abc6d81684c8557e690ed47ed6d659e0daeda26c7d75e764c8da77771a9

  • SHA512

    3f8a88eb1c0c7cebd0b3a8ff9031a3e13601c15852ce15e35ca732e317a33dd0007988e23b4b884d4d8729e32c88b20c1620183c201d4952024df7a5757a2f03

  • SSDEEP

    196608:uvMovhPSQPJqfRDzlYXi6mB57iy5nVug3MthWK:aJPSPlD6mviy5oh

Malware Config

Extracted

Family

xworm

C2

look-omega.gl.at.ply.gg:27099

Attributes
  • Install_directory

    %AppData%

  • install_file

    Update.exe

Targets

    • Target

      UnamBinder.exe

    • Size

      9.6MB

    • MD5

      18c98c616674081b1910103b30ff697a

    • SHA1

      37daea3f1cba0fe605996a3f456897a7bcf7dcdf

    • SHA256

      de902abc6d81684c8557e690ed47ed6d659e0daeda26c7d75e764c8da77771a9

    • SHA512

      3f8a88eb1c0c7cebd0b3a8ff9031a3e13601c15852ce15e35ca732e317a33dd0007988e23b4b884d4d8729e32c88b20c1620183c201d4952024df7a5757a2f03

    • SSDEEP

      196608:uvMovhPSQPJqfRDzlYXi6mB57iy5nVug3MthWK:aJPSPlD6mviy5oh

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks