General

  • Target

    c7xdsg43_1.exe._2.exe

  • Size

    3.9MB

  • Sample

    250124-esd4eaypbw

  • MD5

    2e975b87f63c8dd384c803765d5d1c0b

  • SHA1

    fdf785a15472093c6ff6228a4912076029eef54e

  • SHA256

    08e348287c5287415442ccf3ce4ffef96d4a5d71f4d2de045e99f115db6c12b7

  • SHA512

    dfdd0e57c54fea79a709958376bff681ca4f2c63e292d80e18b517ac9815ab585902cdd0831336ffd0c318b96955de948470900dbcb772c27a9da7d330d05697

  • SSDEEP

    49152:QHgoyciELo8BJSstkpUbSkeQKyAWmDl8:

Malware Config

Extracted

Family

xworm

C2

vshostupdater.duckdns.org:34357

newport1179.duckdns.org:34357

windowsbre.duckdns.org:34357

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Updater.exe

Targets

    • Target

      c7xdsg43_1.exe._2.exe

    • Size

      3.9MB

    • MD5

      2e975b87f63c8dd384c803765d5d1c0b

    • SHA1

      fdf785a15472093c6ff6228a4912076029eef54e

    • SHA256

      08e348287c5287415442ccf3ce4ffef96d4a5d71f4d2de045e99f115db6c12b7

    • SHA512

      dfdd0e57c54fea79a709958376bff681ca4f2c63e292d80e18b517ac9815ab585902cdd0831336ffd0c318b96955de948470900dbcb772c27a9da7d330d05697

    • SSDEEP

      49152:QHgoyciELo8BJSstkpUbSkeQKyAWmDl8:

    • Detect Xworm Payload

    • Modifies security service

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Event Triggered Execution: Image File Execution Options Injection

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks