General

  • Target

    7f6351ccdc13e55801877c661b590bd574725c3380ca45a43c66dbb7ee0bf7ac.exe

  • Size

    57KB

  • Sample

    250122-scrw8a1qft

  • MD5

    72798272d12c892963ba1520331a7ba7

  • SHA1

    475c8c703fec75656132242746445a496c8bbfb2

  • SHA256

    7f6351ccdc13e55801877c661b590bd574725c3380ca45a43c66dbb7ee0bf7ac

  • SHA512

    fc59d55df3f527024986dbef62acaea8910a383d772402e8a96c45c07346685ef81b880aaf7caf451642797dece0386ea121048b7ca11d1a3fe3c6fe95338a42

  • SSDEEP

    1536:zL4nvOCq2RCXkOlKHI6Or6kIIJ2vb/UEzsoO6LAJPxOsL6:zL4o2kiUdWbcqrA1xOsL6

Malware Config

Extracted

Family

xworm

C2

192.168.10.71:1177

Attributes
  • Install_directory

    %Public%

  • install_file

    USB.exe

Targets

    • Target

      7f6351ccdc13e55801877c661b590bd574725c3380ca45a43c66dbb7ee0bf7ac.exe

    • Size

      57KB

    • MD5

      72798272d12c892963ba1520331a7ba7

    • SHA1

      475c8c703fec75656132242746445a496c8bbfb2

    • SHA256

      7f6351ccdc13e55801877c661b590bd574725c3380ca45a43c66dbb7ee0bf7ac

    • SHA512

      fc59d55df3f527024986dbef62acaea8910a383d772402e8a96c45c07346685ef81b880aaf7caf451642797dece0386ea121048b7ca11d1a3fe3c6fe95338a42

    • SSDEEP

      1536:zL4nvOCq2RCXkOlKHI6Or6kIIJ2vb/UEzsoO6LAJPxOsL6:zL4o2kiUdWbcqrA1xOsL6

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks