General

  • Target

    78423879243879234879423879243879342847932243897.exe

  • Size

    167KB

  • Sample

    250303-3r77vstky5

  • MD5

    6d9feaf76fb62e070d958c0170dc1fd9

  • SHA1

    d3c9de15d3f268edc65bf0000a8bdb23d6eb8487

  • SHA256

    42101b053272c4cb236c059a6a4b168b48e747d59819e28998736db1e8580f64

  • SHA512

    6e28413715712aa91859d941ff3d16ca4a2a05ff745f30cf5b34cc1cb87a72b0985a4f525867a5abfc980abf75d59ce9c025e894565040a03deb40410ac68c5a

  • SSDEEP

    3072:Fx9KDUpvI+bkT8wDOP1qBz65/M6If+3Js+3JFkKeTnY:F2DU9pbbqxBt25

Malware Config

Extracted

Family

xworm

C2

45.88.91.55:8893

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    sys-32.exe

Targets

    • Target

      78423879243879234879423879243879342847932243897.exe

    • Size

      167KB

    • MD5

      6d9feaf76fb62e070d958c0170dc1fd9

    • SHA1

      d3c9de15d3f268edc65bf0000a8bdb23d6eb8487

    • SHA256

      42101b053272c4cb236c059a6a4b168b48e747d59819e28998736db1e8580f64

    • SHA512

      6e28413715712aa91859d941ff3d16ca4a2a05ff745f30cf5b34cc1cb87a72b0985a4f525867a5abfc980abf75d59ce9c025e894565040a03deb40410ac68c5a

    • SSDEEP

      3072:Fx9KDUpvI+bkT8wDOP1qBz65/M6If+3Js+3JFkKeTnY:F2DU9pbbqxBt25

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks