General

  • Target

    MasonClient.exe

  • Size

    54KB

  • Sample

    250305-a9skxatygy

  • MD5

    a51b3cb18641d1abd8cc9104e06e09c4

  • SHA1

    2e656f9f2fff61c4e0594a4459fe945c07735bc7

  • SHA256

    b19785992fe57f8f4ab7c7fc7d067a6d3c0832252afc5f13d6e165afefcff90b

  • SHA512

    ae01bc88a59e3b90b0f6d684cbc05b62e57baf3fe68d75d08652e0006adb3d6000939c6e688ce28d4a603afdf1e80b6b1cb3d5e9abaef24938bb8da34a403b76

  • SSDEEP

    768:/IvFRjaxUL8U1Wj0bIKN0l1VzIf823Xocb036rSqyt/X6LGaAhJO0gu3:/I9Rjaxhj8NsfITHHb036Q/pbO0gu3

Malware Config

Extracted

Family

xworm

Attributes
  • install_file

    USB.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe

exe.dropper

https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat

Targets

    • Target

      MasonClient.exe

    • Size

      54KB

    • MD5

      a51b3cb18641d1abd8cc9104e06e09c4

    • SHA1

      2e656f9f2fff61c4e0594a4459fe945c07735bc7

    • SHA256

      b19785992fe57f8f4ab7c7fc7d067a6d3c0832252afc5f13d6e165afefcff90b

    • SHA512

      ae01bc88a59e3b90b0f6d684cbc05b62e57baf3fe68d75d08652e0006adb3d6000939c6e688ce28d4a603afdf1e80b6b1cb3d5e9abaef24938bb8da34a403b76

    • SSDEEP

      768:/IvFRjaxUL8U1Wj0bIKN0l1VzIf823Xocb036rSqyt/X6LGaAhJO0gu3:/I9Rjaxhj8NsfITHHb036Q/pbO0gu3

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks