General

  • Target

    Sorry.exe

  • Size

    481KB

  • Sample

    250123-jkpmds1ldl

  • MD5

    5c152e46af6e1de7f406cea257af9d1e

  • SHA1

    d8b830c0c2e0aa7daeaab5759dc2e71351e98e3f

  • SHA256

    f6262425730236425df601e87f0742166849b0737a1d918c5a8609553f75630f

  • SHA512

    f52e406d166f61319ef2cc781a9c90abab2714746ae3203a8f7f412b02c45aeeb48d4f6966e6bd99279a8f348ac96ef379dc3f58259331c480dd70bf734abb01

  • SSDEEP

    12288:CF2itC7rxZjmoXuaiHi/Xy3I3sBmy1CLoMavQ9clJb8S:4HSZqoXuWPzloMaI9clD

Malware Config

Extracted

Family

xworm

Mutex

yNحكـX8ٍبAGLWِF6Jo2DiObلٍLZا3ا

Attributes
  • Install_directory

    %Port%

  • install_file

    MicrosoftEdgeUpdateTaskMachineUAC.exe

aes.plain

Targets

    • Target

      Sorry.exe

    • Size

      481KB

    • MD5

      5c152e46af6e1de7f406cea257af9d1e

    • SHA1

      d8b830c0c2e0aa7daeaab5759dc2e71351e98e3f

    • SHA256

      f6262425730236425df601e87f0742166849b0737a1d918c5a8609553f75630f

    • SHA512

      f52e406d166f61319ef2cc781a9c90abab2714746ae3203a8f7f412b02c45aeeb48d4f6966e6bd99279a8f348ac96ef379dc3f58259331c480dd70bf734abb01

    • SSDEEP

      12288:CF2itC7rxZjmoXuaiHi/Xy3I3sBmy1CLoMavQ9clJb8S:4HSZqoXuWPzloMaI9clD

    • Detect Xworm Payload

    • Modifies Windows Defender DisableAntiSpyware settings

    • Windows security bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks