General

  • Target

    Y1138_BootstrapperNew.exe

  • Size

    2.9MB

  • Sample

    250304-1m24ya1zaw

  • MD5

    ec8002f20ee00ec84138608ebb7d5154

  • SHA1

    d77b5dfa71bf3b48e351d69a6b251c21c8650d0d

  • SHA256

    9376c048648b422f2e84397e969f9d403a4fa6d30c2aabdaba2880e09761f28f

  • SHA512

    3ee7644cea6fef18cc17f8a0a46408bdb2897fa2da7808e5bc8563786f3a529b2c57141123e2d29eaba03061273ca28d3b3d3ae5758089ce2d4d6a992d661487

  • SSDEEP

    49152:gUcNWu+5IYryMRbEKRWomDRtL38nmVu4+0R/1nnBsfwGGQCEnNNemNznrYWfym//:gUD15XNRbVRWomDRtrbrNnnsbGQCEnNP

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %port%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/GMv8QPCE

Targets

    • Target

      Y1138_BootstrapperNew.exe

    • Size

      2.9MB

    • MD5

      ec8002f20ee00ec84138608ebb7d5154

    • SHA1

      d77b5dfa71bf3b48e351d69a6b251c21c8650d0d

    • SHA256

      9376c048648b422f2e84397e969f9d403a4fa6d30c2aabdaba2880e09761f28f

    • SHA512

      3ee7644cea6fef18cc17f8a0a46408bdb2897fa2da7808e5bc8563786f3a529b2c57141123e2d29eaba03061273ca28d3b3d3ae5758089ce2d4d6a992d661487

    • SSDEEP

      49152:gUcNWu+5IYryMRbEKRWomDRtL38nmVu4+0R/1nnBsfwGGQCEnNNemNznrYWfym//:gUD15XNRbVRWomDRtrbrNnnsbGQCEnNP

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks