General

  • Target

    ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2

  • Size

    1.7MB

  • Sample

    250305-k65feavnz8

  • MD5

    a378359637b5d95388debc25f568ce9f

  • SHA1

    1d88e287db2b9bb659688d8b79e418d7504c3145

  • SHA256

    ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2

  • SHA512

    b500368c49228ff68e5537bd6b743461d111e8eb2ca87020b86c2973a65163787db95dede3a4bbf9b6771159322a37f8112253a356d622a0ed9adfb7e1431fa1

  • SSDEEP

    49152:1Djlabwz9Om4Yd3cY6nbdoQi5i1kpMWQQx8:Zqw/4wKoQpWW

Malware Config

Extracted

Family

xworm

C2

set-reduces.gl.at.ply.gg:28950

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    svchost.exe

Targets

    • Target

      ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2

    • Size

      1.7MB

    • MD5

      a378359637b5d95388debc25f568ce9f

    • SHA1

      1d88e287db2b9bb659688d8b79e418d7504c3145

    • SHA256

      ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2

    • SHA512

      b500368c49228ff68e5537bd6b743461d111e8eb2ca87020b86c2973a65163787db95dede3a4bbf9b6771159322a37f8112253a356d622a0ed9adfb7e1431fa1

    • SSDEEP

      49152:1Djlabwz9Om4Yd3cY6nbdoQi5i1kpMWQQx8:Zqw/4wKoQpWW

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks