General

  • Target

    msedge.exe

  • Size

    9.6MB

  • Sample

    250122-sxcb9stpcr

  • MD5

    12836b3817f7e85b810575446bb72255

  • SHA1

    dd0f8dca4eceef452c870e3c8bbfdade5af5d55a

  • SHA256

    1218026b31245222007dd76af6add1ad688e68c1bb6480c24e9d0ebbdc7e2d6b

  • SHA512

    5fb88f976038beae520621fb7e7cdef66e0ca613f2856b2af9aea011b2c1e6f8a9eb534fe079c9d4572aae2ac1465153bfde9892cb8a4d25a186169836005bbd

  • SSDEEP

    196608:FevF+BpyvdJFOcTnMLghtBuXnmHzWR+1/apPBd:wv4Bs8eMMLuXnOyRaaP

Malware Config

Extracted

Family

xworm

C2

6.tcp.eu.ngrok.io:27099

Attributes
  • Install_directory

    %AppData%

  • install_file

    Update.exe

Targets

    • Target

      msedge.exe

    • Size

      9.6MB

    • MD5

      12836b3817f7e85b810575446bb72255

    • SHA1

      dd0f8dca4eceef452c870e3c8bbfdade5af5d55a

    • SHA256

      1218026b31245222007dd76af6add1ad688e68c1bb6480c24e9d0ebbdc7e2d6b

    • SHA512

      5fb88f976038beae520621fb7e7cdef66e0ca613f2856b2af9aea011b2c1e6f8a9eb534fe079c9d4572aae2ac1465153bfde9892cb8a4d25a186169836005bbd

    • SSDEEP

      196608:FevF+BpyvdJFOcTnMLghtBuXnmHzWR+1/apPBd:wv4Bs8eMMLuXnOyRaaP

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks