General

  • Target

    VC_redist.x64.bat

  • Size

    27KB

  • Sample

    250301-3pykmswyds

  • MD5

    59ed597b16bdecda0fa1f5317d679506

  • SHA1

    e2117126d6e4b2dd02d4eee180c8f786c9b6424e

  • SHA256

    8b095c70bb18e878b288db10c7b9d5de9ed2df22f075b30ed0cbf3fdcb2c9342

  • SHA512

    d37b2f951d1093bb1f750d6996e080f0f5b20ac2cf5139f32f1b154bf2d4a61a8ecb033383e6a3d7fbb875dae63d147d7dc97bc241bf2da1497e378822004dea

  • SSDEEP

    384:eQxxUGTxvOwLNVpRP5mx39dm7dQgh+1Oi:xxigvOwLDpd5mx39L

Malware Config

Extracted

Family

xworm

Version

3.1

C2

185.172.175.125:5000

Mutex

Uto2xJheY5reQlME

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      VC_redist.x64.bat

    • Size

      27KB

    • MD5

      59ed597b16bdecda0fa1f5317d679506

    • SHA1

      e2117126d6e4b2dd02d4eee180c8f786c9b6424e

    • SHA256

      8b095c70bb18e878b288db10c7b9d5de9ed2df22f075b30ed0cbf3fdcb2c9342

    • SHA512

      d37b2f951d1093bb1f750d6996e080f0f5b20ac2cf5139f32f1b154bf2d4a61a8ecb033383e6a3d7fbb875dae63d147d7dc97bc241bf2da1497e378822004dea

    • SSDEEP

      384:eQxxUGTxvOwLNVpRP5mx39dm7dQgh+1Oi:xxigvOwLDpd5mx39L

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks