General

  • Target

    uzitempupdated.exe

  • Size

    5.8MB

  • Sample

    250126-emah2a1ndw

  • MD5

    1f15b01df8ca854ab2b085c8fb76e721

  • SHA1

    40329bf69f7f6d8ac7cb27fd7af55eb3e67bdf2e

  • SHA256

    94c98e940736b995b08aca070a01f728836754a0feadfa11c355f98f39746792

  • SHA512

    dda1cc8dba7c7090b2a7b5381a1ee9c973706aa5ade454f77088958399b9eefef32193050164c3c9297ab587ee434709b0ecc50001366ef9da1b56c2008461c1

  • SSDEEP

    98304:3FVWri3M7McvSQC8dF+jDgmrhe9a6/Al7q8r07c9tCHByu74A5BgG1HYPNDJGl:3FVWUIMcakqjDB1ep4h5rX9tCHBf7T37

Malware Config

Targets

    • Target

      uzitempupdated.exe

    • Size

      5.8MB

    • MD5

      1f15b01df8ca854ab2b085c8fb76e721

    • SHA1

      40329bf69f7f6d8ac7cb27fd7af55eb3e67bdf2e

    • SHA256

      94c98e940736b995b08aca070a01f728836754a0feadfa11c355f98f39746792

    • SHA512

      dda1cc8dba7c7090b2a7b5381a1ee9c973706aa5ade454f77088958399b9eefef32193050164c3c9297ab587ee434709b0ecc50001366ef9da1b56c2008461c1

    • SSDEEP

      98304:3FVWri3M7McvSQC8dF+jDgmrhe9a6/Al7q8r07c9tCHByu74A5BgG1HYPNDJGl:3FVWUIMcakqjDB1ep4h5rX9tCHBf7T37

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks for VirtualBox Guest Additions in registry

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks