General

  • Target

    BootstrapperV3_1_protected.exe

  • Size

    7.3MB

  • Sample

    250304-tlavqsvmz7

  • MD5

    2a8cf24db62f39d25634b4d3d1f7d997

  • SHA1

    3a5161efaec9020bb223b3ce75d80af0016658e1

  • SHA256

    81495b2fed47dda40e5ca4e871ad989d5906b2d75fd563f2e2134f10264f2d55

  • SHA512

    eeeca9595a1bfa6a03859080eff4d11d41de686ff3b6171b674a650112c74534b99400cc68461d1dc99a03c57c1f7566c39e9ea4a79d851a95964c1d1ab691da

  • SSDEEP

    196608:PS4H3QWhpkTBch+3Tq02WBqUx6H783EPq2s1j:PSPyk9mSqPWcUx478n5p

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    $77VoicemodDriver.exe

  • pastebin_url

    https://pastebin.com/raw/tPMsFy8n

Targets

    • Target

      BootstrapperV3_1_protected.exe

    • Size

      7.3MB

    • MD5

      2a8cf24db62f39d25634b4d3d1f7d997

    • SHA1

      3a5161efaec9020bb223b3ce75d80af0016658e1

    • SHA256

      81495b2fed47dda40e5ca4e871ad989d5906b2d75fd563f2e2134f10264f2d55

    • SHA512

      eeeca9595a1bfa6a03859080eff4d11d41de686ff3b6171b674a650112c74534b99400cc68461d1dc99a03c57c1f7566c39e9ea4a79d851a95964c1d1ab691da

    • SSDEEP

      196608:PS4H3QWhpkTBch+3Tq02WBqUx6H783EPq2s1j:PSPyk9mSqPWcUx478n5p

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks