General

  • Target

    tergdfgdfg.exe

  • Size

    80KB

  • Sample

    250304-q79peasm15

  • MD5

    9410280381c7972ba775e13d094a87e0

  • SHA1

    3389d7bf5fdc0c613bb130da42d76968b221392d

  • SHA256

    f14d1d27a20ad79684026a18395389354d6dc0e529d2d795bf80e3b66f76913b

  • SHA512

    2c829e655ac71245f8258015556910b6f9eb2988c9e1bb1ecafedee7406b13a10f586f5d3cdecdc374fd8763d538eb2cf84db3a98aec6076629d87bcf998e5b9

  • SSDEEP

    1536:ccrBb0z39BE4SNMZlvaE67897ymsDKM88wEaCnbeHsy/yim/1y1ejY6yFOBa:zrBbcnCMZlvaZM2msWxEleJ/yjgf6yFD

Malware Config

Targets

    • Target

      tergdfgdfg.exe

    • Size

      80KB

    • MD5

      9410280381c7972ba775e13d094a87e0

    • SHA1

      3389d7bf5fdc0c613bb130da42d76968b221392d

    • SHA256

      f14d1d27a20ad79684026a18395389354d6dc0e529d2d795bf80e3b66f76913b

    • SHA512

      2c829e655ac71245f8258015556910b6f9eb2988c9e1bb1ecafedee7406b13a10f586f5d3cdecdc374fd8763d538eb2cf84db3a98aec6076629d87bcf998e5b9

    • SSDEEP

      1536:ccrBb0z39BE4SNMZlvaE67897ymsDKM88wEaCnbeHsy/yim/1y1ejY6yFOBa:zrBbcnCMZlvaZM2msWxEleJ/yjgf6yFD

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks