General

  • Target

    SynovaX-Bootstrapper.exe

  • Size

    89KB

  • Sample

    250306-wtrvbst1hs

  • MD5

    ed78d35bb29ca31c513323b193fcb58d

  • SHA1

    5ecfc87ce1aec3a0ff03515789640c61632e423a

  • SHA256

    1daa72ef555a8d914176f0f4050b77de7b9d1cebd4c39aebea2443648313cfe2

  • SHA512

    3766de02821291c540ebb62abf737b453fae85279c57b11a5c16fa9e7e61f26b47b584831d1237a355fa412a7ad38205e4a24ab3ee787f52d92a6042f16ddddf

  • SSDEEP

    1536:z7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfowiOr:v7DhdC6kzWypvaQ0FxyNTBfow

Malware Config

Extracted

Family

xworm

C2

SynoACOUSTIC-48269.portmap.host:48269

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7851532344:AAE8qkSFZrbQrajpw8LiT-zsdIxuZ0SFaso

Targets

    • Target

      SynovaX-Bootstrapper.exe

    • Size

      89KB

    • MD5

      ed78d35bb29ca31c513323b193fcb58d

    • SHA1

      5ecfc87ce1aec3a0ff03515789640c61632e423a

    • SHA256

      1daa72ef555a8d914176f0f4050b77de7b9d1cebd4c39aebea2443648313cfe2

    • SHA512

      3766de02821291c540ebb62abf737b453fae85279c57b11a5c16fa9e7e61f26b47b584831d1237a355fa412a7ad38205e4a24ab3ee787f52d92a6042f16ddddf

    • SSDEEP

      1536:z7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfowiOr:v7DhdC6kzWypvaQ0FxyNTBfow

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks