General

  • Target

    SolaraX.exe

  • Size

    74KB

  • Sample

    250302-azm8faxzbx

  • MD5

    aef41983064b12d1e648100e8141bf19

  • SHA1

    b258d4a810e818e9c9dcaba62f75f34036b60fcd

  • SHA256

    834bcea2665dc99b4c16fe87095f3e2b44e2e013ec1017407a061a1203c2f3cf

  • SHA512

    2e4e3fdf7cd1892b73cf1989dfd82d91c677653a4501f44bb2d74b153b72982e069998b5bef097a7645970838c13ac86ec546173f6baf3afb7cbc26e6c9d5524

  • SSDEEP

    1536:CSwcF9ZPLxJfu4OjKOd5fbLioM5706leROrV3P7UN:dwcF9ZPG4O+Od5fbLilveROrpw

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:34930

minimum-ball.gl.at.ply.gg:34930

Attributes
  • Install_directory

    %AppData%

  • install_file

    SolaraX.exe

Targets

    • Target

      SolaraX.exe

    • Size

      74KB

    • MD5

      aef41983064b12d1e648100e8141bf19

    • SHA1

      b258d4a810e818e9c9dcaba62f75f34036b60fcd

    • SHA256

      834bcea2665dc99b4c16fe87095f3e2b44e2e013ec1017407a061a1203c2f3cf

    • SHA512

      2e4e3fdf7cd1892b73cf1989dfd82d91c677653a4501f44bb2d74b153b72982e069998b5bef097a7645970838c13ac86ec546173f6baf3afb7cbc26e6c9d5524

    • SSDEEP

      1536:CSwcF9ZPLxJfu4OjKOd5fbLioM5706leROrV3P7UN:dwcF9ZPG4O+Od5fbLilveROrpw

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks