General

  • Target

    cheat.exe

  • Size

    197KB

  • Sample

    250306-kw42wstzd1

  • MD5

    6b60d478dc59ba2d30610d57d36a929b

  • SHA1

    0b9240afd4338b4ec6608ea1a2ad4624fe02b1d8

  • SHA256

    e6a07c0c643535a9b65fb286f4fafce14fafef0b830557e2d67f91f06ae2bbbc

  • SHA512

    15967a5595bd8a2d413628a4d4d35f5bf60c3b4529c0d17216d43620918c386de1893e621985e8b04a508353e675f23b857c7fea11fe12aa247f0812626c2d4e

  • SSDEEP

    3072:od9kkHFE9jM/Oju8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLns:oFE9wUhcX7elbKTuq9bfF/H9d9n

Malware Config

Extracted

Family

xworm

Version

5.0

C2

ohsorry-20836.portmap.host:20836

Mutex

BV3jFFIYrb13VXbT

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      cheat.exe

    • Size

      197KB

    • MD5

      6b60d478dc59ba2d30610d57d36a929b

    • SHA1

      0b9240afd4338b4ec6608ea1a2ad4624fe02b1d8

    • SHA256

      e6a07c0c643535a9b65fb286f4fafce14fafef0b830557e2d67f91f06ae2bbbc

    • SHA512

      15967a5595bd8a2d413628a4d4d35f5bf60c3b4529c0d17216d43620918c386de1893e621985e8b04a508353e675f23b857c7fea11fe12aa247f0812626c2d4e

    • SSDEEP

      3072:od9kkHFE9jM/Oju8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLns:oFE9wUhcX7elbKTuq9bfF/H9d9n

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Disables Task Manager via registry modification

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks