General

  • Target

    Winlocker Builder v0.6.exe

  • Size

    1.4MB

  • Sample

    250124-3czxyatpbt

  • MD5

    6b6a8cd5e51f45e84db0faf0e23bce20

  • SHA1

    9ddfb0ea0ee600dcd5f8ef1878a19f4bb874cafd

  • SHA256

    2eddf88a155ffdb09a1382d1955d26ae5e394def25a2eb4d8c558babce0acde4

  • SHA512

    17dc258784448706eb3de95d328858dd64a15a7cd7abd33cac1cf8f0b6d73d58c0a7514f852f7159b9fb9996055cd942b101ebc53186e6722d168367075a698b

  • SSDEEP

    24576:HYbXvsRLDInc+3WNyc4aKZQ6VvDrVq3EXcWdFVtV6d/PHk:F0c+Gr1YBrNXcEFVf6pPH

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

vTtlhGPfn0ebMPsq

Attributes
  • Install_directory

    %Public%

  • install_file

    explorer.exe

  • pastebin_url

    https://pastebin.com/raw/4zaiEtZS

  • telegram

    https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256

aes.plain

Targets

    • Target

      Winlocker Builder v0.6.exe

    • Size

      1.4MB

    • MD5

      6b6a8cd5e51f45e84db0faf0e23bce20

    • SHA1

      9ddfb0ea0ee600dcd5f8ef1878a19f4bb874cafd

    • SHA256

      2eddf88a155ffdb09a1382d1955d26ae5e394def25a2eb4d8c558babce0acde4

    • SHA512

      17dc258784448706eb3de95d328858dd64a15a7cd7abd33cac1cf8f0b6d73d58c0a7514f852f7159b9fb9996055cd942b101ebc53186e6722d168367075a698b

    • SSDEEP

      24576:HYbXvsRLDInc+3WNyc4aKZQ6VvDrVq3EXcWdFVtV6d/PHk:F0c+Gr1YBrNXcEFVf6pPH

    • Detect Xworm Payload

    • Modifies visiblity of hidden/system files in Explorer

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks