General

  • Target

    123e.bat

  • Size

    371KB

  • Sample

    250123-rfv8daskaw

  • MD5

    a525af6701d8e4a594e2994ea870a897

  • SHA1

    2306ae5f37d70cc766548310e4f861cb5429b789

  • SHA256

    642c23c2a4fdc8ef798b8cd15f01afdc8267f2e86653d189e42e4ffe46768460

  • SHA512

    92b04239a02e7fa2c2a3c8aba75b0efd22e8f5fef0b3f50582614b790ff28c9b012e110545d251de1c6d079ee072a73d37df1d719d7dc4628b147c8e12e8c4b8

  • SSDEEP

    6144:+L5ako4qqxyFfjAucVx6Nbk9CKAZ/QEqnURfniEEYLyNwTn1Z0AGM63RBpCSkuVi:+taD4qqxKbExWrTZ/QKet2cFMIRB9wvZ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

real-enquiry.gl.at.ply.gg:15403

Mutex

XMR2SpG5rhnOf6LO

Attributes
  • Install_directory

    %Public%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      123e.bat

    • Size

      371KB

    • MD5

      a525af6701d8e4a594e2994ea870a897

    • SHA1

      2306ae5f37d70cc766548310e4f861cb5429b789

    • SHA256

      642c23c2a4fdc8ef798b8cd15f01afdc8267f2e86653d189e42e4ffe46768460

    • SHA512

      92b04239a02e7fa2c2a3c8aba75b0efd22e8f5fef0b3f50582614b790ff28c9b012e110545d251de1c6d079ee072a73d37df1d719d7dc4628b147c8e12e8c4b8

    • SSDEEP

      6144:+L5ako4qqxyFfjAucVx6Nbk9CKAZ/QEqnURfniEEYLyNwTn1Z0AGM63RBpCSkuVi:+taD4qqxKbExWrTZ/QKet2cFMIRB9wvZ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks