General

  • Target

    stub.exe

  • Size

    98KB

  • Sample

    250125-mxngmszjgv

  • MD5

    bdfa5841c9e4eef468202a788c52dec2

  • SHA1

    71756d583a44fb8ac91b20c2d973b91acadb9753

  • SHA256

    1def3bf1a5e4da176b49943bfa039ff657d71b4d60aa6b1c9116484f73d0fc71

  • SHA512

    2b92282c1338b5808e2a9bfa62a55a431d11cb98d5e5ea848c24fa209bd566402bfb323c3cd21083048d8a7efd55012e40bcf3c679f54f4f5a159ff98b7aa4c2

  • SSDEEP

    1536:WuYbI6lmBJK9pGmDKdd5xy2zizytvJIWUIeEJ7DvRDaGeqCd8Ft6mUq:rYbI6yPdnxxieaWUrEd7Na6C+jUq

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Attributes
  • Install_directory

    %ProgramData%

Targets

    • Target

      stub.exe

    • Size

      98KB

    • MD5

      bdfa5841c9e4eef468202a788c52dec2

    • SHA1

      71756d583a44fb8ac91b20c2d973b91acadb9753

    • SHA256

      1def3bf1a5e4da176b49943bfa039ff657d71b4d60aa6b1c9116484f73d0fc71

    • SHA512

      2b92282c1338b5808e2a9bfa62a55a431d11cb98d5e5ea848c24fa209bd566402bfb323c3cd21083048d8a7efd55012e40bcf3c679f54f4f5a159ff98b7aa4c2

    • SSDEEP

      1536:WuYbI6lmBJK9pGmDKdd5xy2zizytvJIWUIeEJ7DvRDaGeqCd8Ft6mUq:rYbI6yPdnxxieaWUrEd7Na6C+jUq

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks