General

  • Target

    BootstrapperNew.exe

  • Size

    2.9MB

  • Sample

    250305-qee94azky3

  • MD5

    fe2a5662b81e0050926b48325dd1567b

  • SHA1

    974ed628dae46563f49acfe2a4f89a9b41a40220

  • SHA256

    c5fcb6ebea1e21c19773e2735108228e8e81ed7387aa22d97235435a48a0c8fa

  • SHA512

    5591a4b3d894bafb6f58dd9c97584ba23344579f1026aa4364d2cc2d0ed7815f882a064b65ab19d0c788cbc0d384ca6412e7e158fa41f0ee6bfbaeea519872c9

  • SSDEEP

    49152:moWGRUiwhZqwESGRlX8iUw5fH5LGQh+wO+X8ctrK4eWprf4oznzBZAwSkc5nti1g:moWGqvZqwE9Ds/w5P5LiUDtrK4ewrf4F

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe

exe.dropper

https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat

Extracted

Family

xworm

Attributes
  • Install_directory

    %port%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/J42c6s7r

Targets

    • Target

      BootstrapperNew.exe

    • Size

      2.9MB

    • MD5

      fe2a5662b81e0050926b48325dd1567b

    • SHA1

      974ed628dae46563f49acfe2a4f89a9b41a40220

    • SHA256

      c5fcb6ebea1e21c19773e2735108228e8e81ed7387aa22d97235435a48a0c8fa

    • SHA512

      5591a4b3d894bafb6f58dd9c97584ba23344579f1026aa4364d2cc2d0ed7815f882a064b65ab19d0c788cbc0d384ca6412e7e158fa41f0ee6bfbaeea519872c9

    • SSDEEP

      49152:moWGRUiwhZqwESGRlX8iUw5fH5LGQh+wO+X8ctrK4eWprf4oznzBZAwSkc5nti1g:moWGqvZqwE9Ds/w5P5LiUDtrK4ewrf4F

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks