Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    solarav3.exe

  • Size

    187KB

  • Sample

    250301-glt76atjt4

  • MD5

    1391c7899d105d29ed63a14a1f04f26f

  • SHA1

    c5cf3200d8463f14d06c927dd4ceb68d98472a9f

  • SHA256

    cf9db2abbe4f144a6541042bb8464811ef1940f57460d96ac5568774fac8471a

  • SHA512

    d5b2be6c57f73f7b1a7a6618082dc630c81a8c60f423df005f264af91647f3cdcec5d120c113dd65e05cdcb948257ede35e77d508e81ff1e69a52e69d5d372fa

  • SSDEEP

    3072:iBw/PNb0sajZr6xkVGmT2vB++bEsO9t0iN2MJtmQ:Cw/Fb0ndr6Y2BbLDM2MJn

Malware Config

Extracted

Family

xworm

C2

things-gap.gl.at.ply.gg:63131

Attributes
  • Install_directory

    %AppData%

  • install_file

    installer.exe

Targets

    • Target

      solarav3.exe

    • Size

      187KB

    • MD5

      1391c7899d105d29ed63a14a1f04f26f

    • SHA1

      c5cf3200d8463f14d06c927dd4ceb68d98472a9f

    • SHA256

      cf9db2abbe4f144a6541042bb8464811ef1940f57460d96ac5568774fac8471a

    • SHA512

      d5b2be6c57f73f7b1a7a6618082dc630c81a8c60f423df005f264af91647f3cdcec5d120c113dd65e05cdcb948257ede35e77d508e81ff1e69a52e69d5d372fa

    • SSDEEP

      3072:iBw/PNb0sajZr6xkVGmT2vB++bEsO9t0iN2MJtmQ:Cw/Fb0ndr6Y2BbLDM2MJn

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks