General

  • Target

    hyper13124234_Slayed.exe

  • Size

    217KB

  • Sample

    250123-wt9p5sykat

  • MD5

    407d0a8b560f6199d29734c3d1028978

  • SHA1

    cafcced9d267e90a05ffb766170a2c508a7fc431

  • SHA256

    e7e795081463df553e8f6677d0e99eefd372bc0f4144f77e1fb1e0961ff1f0dd

  • SHA512

    d217b2868c4098b16d776c1069400596b93b8f0792cde6f18917982c7d4bf8fd0bbc4c8d8934dbdf861b6410f637b36c528626e368bb960e9cf1c88bbde218de

  • SSDEEP

    3072:VTGHO7A7ht0uoe1DGmh4ellaCzSnKi8uhGP6/whgSP:VTGHO+tBDueJDPs9

Malware Config

Targets

    • Target

      hyper13124234_Slayed.exe

    • Size

      217KB

    • MD5

      407d0a8b560f6199d29734c3d1028978

    • SHA1

      cafcced9d267e90a05ffb766170a2c508a7fc431

    • SHA256

      e7e795081463df553e8f6677d0e99eefd372bc0f4144f77e1fb1e0961ff1f0dd

    • SHA512

      d217b2868c4098b16d776c1069400596b93b8f0792cde6f18917982c7d4bf8fd0bbc4c8d8934dbdf861b6410f637b36c528626e368bb960e9cf1c88bbde218de

    • SSDEEP

      3072:VTGHO7A7ht0uoe1DGmh4ellaCzSnKi8uhGP6/whgSP:VTGHO+tBDueJDPs9

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks