General

  • Target

    MasonClient.exe

  • Size

    48KB

  • Sample

    250302-zvmtjsvvex

  • MD5

    8f28ca9a926d19b481928e7943818c18

  • SHA1

    c39af1be425a90eb806d2874ad210266f55f297c

  • SHA256

    ea0cd48a7bbf5c3df7505631380715287c22db6cdb770dc36f211bba02bae59b

  • SHA512

    2acdbfe077ebc93a50836c7a719646445e48bfb893c05ccc06260bc815b91e28b0f5cd478131be2a71e330621f50d7712a3169c4234e68ebb6d7367aac9fc789

  • SSDEEP

    1536:Wt1VFdabn9SaSLxeQSoY7r8WnRzWnRYWnRVWnRyWnR899LSyYaW2ta46aXHWnRo5:m1DD3A5b3hbO1

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %port%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/6EU9ps8S

Targets

    • Target

      MasonClient.exe

    • Size

      48KB

    • MD5

      8f28ca9a926d19b481928e7943818c18

    • SHA1

      c39af1be425a90eb806d2874ad210266f55f297c

    • SHA256

      ea0cd48a7bbf5c3df7505631380715287c22db6cdb770dc36f211bba02bae59b

    • SHA512

      2acdbfe077ebc93a50836c7a719646445e48bfb893c05ccc06260bc815b91e28b0f5cd478131be2a71e330621f50d7712a3169c4234e68ebb6d7367aac9fc789

    • SSDEEP

      1536:Wt1VFdabn9SaSLxeQSoY7r8WnRzWnRYWnRVWnRyWnR899LSyYaW2ta46aXHWnRo5:m1DD3A5b3hbO1

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Disables RegEdit via registry modification

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks