General

  • Target

    SPOOFER.exe

  • Size

    100KB

  • Sample

    250123-f5z23swkak

  • MD5

    16a83a02e42ff5cccf920ab083ae38b8

  • SHA1

    882dce9a3edb6908d02605594018a23b729052b6

  • SHA256

    b51ff988152a1d96407941ee19298e7e4ce8035ce6dff054c3b439110dfb101d

  • SHA512

    4ebd72f8a79884a90a71ba587fb2a6609a0a76a8d58e6d1d574dc280b7be71f4771a5fcf32d4c4d248ce4e0b5cd87aac04731e4f815ef2927eab26812f26d940

  • SSDEEP

    3072:JoJpXPp1M4lq34QZ48dvVfyFp23HjQID+0w:ux1Hs4YBdvVauhL

Malware Config

Extracted

Family

xworm

C2

logo-kerry.gl.at.ply.gg:23249

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      SPOOFER.exe

    • Size

      100KB

    • MD5

      16a83a02e42ff5cccf920ab083ae38b8

    • SHA1

      882dce9a3edb6908d02605594018a23b729052b6

    • SHA256

      b51ff988152a1d96407941ee19298e7e4ce8035ce6dff054c3b439110dfb101d

    • SHA512

      4ebd72f8a79884a90a71ba587fb2a6609a0a76a8d58e6d1d574dc280b7be71f4771a5fcf32d4c4d248ce4e0b5cd87aac04731e4f815ef2927eab26812f26d940

    • SSDEEP

      3072:JoJpXPp1M4lq34QZ48dvVfyFp23HjQID+0w:ux1Hs4YBdvVauhL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks