General

  • Target

    NHCUR_BootstrapperNew.exe

  • Size

    2.9MB

  • Sample

    250304-1enata1xbv

  • MD5

    8f4833925c458ee2c6b40ef0e0b978f0

  • SHA1

    f37823826806dfe3ab30f6f92ee9807ca3265332

  • SHA256

    2da50060f34dbe8ae3cb42988efbe40546eba522f090958013b3e47178aa04c7

  • SHA512

    88b81b3d204b6ef0234740a0795659f6a924b5106a80cac8d4d174a48003285b395598952de6c03075f15b3cf1055d86d3e604b1346eb8285f098dc71f0e4e97

  • SSDEEP

    49152:8gnJGTce2a1Qo0JjdjW62omu2pCoXghq86WKAlQAd882TQaa0t/s/LAZ42Q:tE4eBOo0JjdjpJcNA9882kJbMC

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %port%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/GMv8QPCE

Targets

    • Target

      NHCUR_BootstrapperNew.exe

    • Size

      2.9MB

    • MD5

      8f4833925c458ee2c6b40ef0e0b978f0

    • SHA1

      f37823826806dfe3ab30f6f92ee9807ca3265332

    • SHA256

      2da50060f34dbe8ae3cb42988efbe40546eba522f090958013b3e47178aa04c7

    • SHA512

      88b81b3d204b6ef0234740a0795659f6a924b5106a80cac8d4d174a48003285b395598952de6c03075f15b3cf1055d86d3e604b1346eb8285f098dc71f0e4e97

    • SSDEEP

      49152:8gnJGTce2a1Qo0JjdjW62omu2pCoXghq86WKAlQAd882TQaa0t/s/LAZ42Q:tE4eBOo0JjdjpJcNA9882kJbMC

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks