General

  • Target

    ASpoofer.exe

  • Size

    266KB

  • Sample

    250125-x4sp2sxkey

  • MD5

    bc02803808b0fef29141032a807e855f

  • SHA1

    c9d6339a10b06f4ad4175664c8728f6622d83855

  • SHA256

    1670b4755805f0d523fba188435da1357c62562153db2b8fa5743ab9906e2c54

  • SHA512

    2c27607c0c921e2d86a2e63bc7b2a0cea0df6f29d693ad9e91c16895ef348a6f415b2eaaeb74c41e25a65c3bd1c69578c78866725de6b1832f89f4283f71c0c3

  • SSDEEP

    6144:YM+vTWbj7v/5bTgVziHzZnSKrCbYMBbX8Sq:YM+vo7v/5/gVziHlBrCbYq8b

Malware Config

Extracted

Family

xworm

C2

IDKTOBEHONESTNIGAS-56344.portmap.io:56344

Attributes
  • install_file

    Mason.exe

Targets

    • Target

      ASpoofer.exe

    • Size

      266KB

    • MD5

      bc02803808b0fef29141032a807e855f

    • SHA1

      c9d6339a10b06f4ad4175664c8728f6622d83855

    • SHA256

      1670b4755805f0d523fba188435da1357c62562153db2b8fa5743ab9906e2c54

    • SHA512

      2c27607c0c921e2d86a2e63bc7b2a0cea0df6f29d693ad9e91c16895ef348a6f415b2eaaeb74c41e25a65c3bd1c69578c78866725de6b1832f89f4283f71c0c3

    • SSDEEP

      6144:YM+vTWbj7v/5bTgVziHzZnSKrCbYMBbX8Sq:YM+vo7v/5/gVziHlBrCbYq8b

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks