General

  • Target

    stub.exe

  • Size

    231KB

  • Sample

    250302-wq2v5azzat

  • MD5

    265b52aa4d100784d7cd39258d5e4d21

  • SHA1

    5b708da62d55364477ffb77e7feb4193f4635f92

  • SHA256

    9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144

  • SHA512

    4ce9e2c41b65ce3c108765dcd934e0f2a12f6c9640cb2ae547997b26a66da1d515ea7bfeb9cc529a57fbd41f51d61068ca7b9f551119e1403ff0cf1b5684e661

  • SSDEEP

    3072:AvNYkHFE9jZOjT4LD8KbgVtn8Mo8G1gVziHzZbIK1YKB/pCAcNqXhwBV3yxSQigS:srE9Z/5bTgVziHzZnSKrCbYMJZbe8tq

Malware Config

Extracted

Family

xworm

Version

5.0

C2

217.136.29.82:50007

Attributes
  • install_file

    Mason.exe

aes.plain

Targets

    • Target

      stub.exe

    • Size

      231KB

    • MD5

      265b52aa4d100784d7cd39258d5e4d21

    • SHA1

      5b708da62d55364477ffb77e7feb4193f4635f92

    • SHA256

      9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144

    • SHA512

      4ce9e2c41b65ce3c108765dcd934e0f2a12f6c9640cb2ae547997b26a66da1d515ea7bfeb9cc529a57fbd41f51d61068ca7b9f551119e1403ff0cf1b5684e661

    • SSDEEP

      3072:AvNYkHFE9jZOjT4LD8KbgVtn8Mo8G1gVziHzZbIK1YKB/pCAcNqXhwBV3yxSQigS:srE9Z/5bTgVziHzZnSKrCbYMJZbe8tq

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks