General

  • Target

    empyrean-grabber-fixed-main.zip

  • Size

    441KB

  • Sample

    250220-acggdasjf1

  • MD5

    dadb2128ac93837c1facb441aeddb129

  • SHA1

    2ad3a9be892565ebed4a6d96bf94051b66a953a1

  • SHA256

    838b27b272e687aa997515c0aa7ef5c3081643e51f03a4437191f81c39cbdfcd

  • SHA512

    3e8f96996a2ecbbfc0d49b49857cf88451d07e067f6fb7925f128f5974f8d5f4e7a79cbf858e9e0359c7d848c9f8fb95352da302b3ab80a5ed95456e6bd60c0a

  • SSDEEP

    6144:yJajO9Iql1HukH5GUMUdWAqvz4VzSYFdQGTB3JEs/hkmOeHtJeQWSE5Pj7glA5Ca:ywjcHl1O2GbzYQq9eoezSEel52fsNkh

Malware Config

Extracted

Family

xworm

C2

links-recovered.at.ply.gg:32508

Mutex

XSLvYVsJZs3bsiZr

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      empyrean-grabber-fixed-main.zip

    • Size

      441KB

    • MD5

      dadb2128ac93837c1facb441aeddb129

    • SHA1

      2ad3a9be892565ebed4a6d96bf94051b66a953a1

    • SHA256

      838b27b272e687aa997515c0aa7ef5c3081643e51f03a4437191f81c39cbdfcd

    • SHA512

      3e8f96996a2ecbbfc0d49b49857cf88451d07e067f6fb7925f128f5974f8d5f4e7a79cbf858e9e0359c7d848c9f8fb95352da302b3ab80a5ed95456e6bd60c0a

    • SSDEEP

      6144:yJajO9Iql1HukH5GUMUdWAqvz4VzSYFdQGTB3JEs/hkmOeHtJeQWSE5Pj7glA5Ca:ywjcHl1O2GbzYQq9eoezSEel52fsNkh

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks