General

  • Target

    XN05R_injector-helper.exe

  • Size

    166KB

  • Sample

    250303-plfnrsxxcx

  • MD5

    ab379c38321e11520f57c362c0dfbc73

  • SHA1

    db66343fd289e8f6466abf35e3c97cb4604e580f

  • SHA256

    a827b4c334d1614b5bf2f6cd6c64a380825073bf2a3adbd93004e5f5063c92f4

  • SHA512

    deb2257401ba7d4b4d81280528752807f4c566543a6bb32dc277e2b8812fb37503638135365ec80c56f9d81fa42ef996dc9335e4a7be1dcaa2c722abb8416c08

  • SSDEEP

    3072:ltmh0cYth8+bk9MuO5wE5SKBz65/M6If+3Js+3JFkKeTnQ:ltmWcUbbfi8SKxBt25

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/kADeGNZE

Targets

    • Target

      XN05R_injector-helper.exe

    • Size

      166KB

    • MD5

      ab379c38321e11520f57c362c0dfbc73

    • SHA1

      db66343fd289e8f6466abf35e3c97cb4604e580f

    • SHA256

      a827b4c334d1614b5bf2f6cd6c64a380825073bf2a3adbd93004e5f5063c92f4

    • SHA512

      deb2257401ba7d4b4d81280528752807f4c566543a6bb32dc277e2b8812fb37503638135365ec80c56f9d81fa42ef996dc9335e4a7be1dcaa2c722abb8416c08

    • SSDEEP

      3072:ltmh0cYth8+bk9MuO5wE5SKBz65/M6If+3Js+3JFkKeTnQ:ltmWcUbbfi8SKxBt25

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks