General

  • Target

    7.exe

  • Size

    302KB

  • Sample

    250124-vlhe9aznbr

  • MD5

    ad169b56eca575c76b5c8662eaafe750

  • SHA1

    8856d6a0532b62af6e6f8e1f6d86bb9433ea12d2

  • SHA256

    b21970eb9efd571d0244356f6b6a96a612527e20b416747e8572c52d30ea5b57

  • SHA512

    cb12c03c6f37e4853349f59470caf763c21dea36d189fb46a85178779df844f6e057080c5804b6441e3a7fbcc881bf60972a88d335a0db5d4fed0997bed5387b

  • SSDEEP

    1536:AQPS0VyRe/kqne5mcDf2c+oH5FlZn2AniQuLvyQIs+oitUKw71nztWGlSBSdkxLZ:AZ0dcEhPorlFeVABf9vtrjxlDE4

Malware Config

Extracted

Family

xworm

C2

feb-arrested.gl.at.ply.gg:17830

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

Targets

    • Target

      7.exe

    • Size

      302KB

    • MD5

      ad169b56eca575c76b5c8662eaafe750

    • SHA1

      8856d6a0532b62af6e6f8e1f6d86bb9433ea12d2

    • SHA256

      b21970eb9efd571d0244356f6b6a96a612527e20b416747e8572c52d30ea5b57

    • SHA512

      cb12c03c6f37e4853349f59470caf763c21dea36d189fb46a85178779df844f6e057080c5804b6441e3a7fbcc881bf60972a88d335a0db5d4fed0997bed5387b

    • SSDEEP

      1536:AQPS0VyRe/kqne5mcDf2c+oH5FlZn2AniQuLvyQIs+oitUKw71nztWGlSBSdkxLZ:AZ0dcEhPorlFeVABf9vtrjxlDE4

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks