General

  • Target

    Solara.exe

  • Size

    72KB

  • Sample

    250307-rxwkga1ycw

  • MD5

    40fae76ad7eb67e5690cf09412155cb8

  • SHA1

    829a5b1b1a0ae2356e607605d8d8a8a7ea60108c

  • SHA256

    fcfd2661484f8051219cbf126a532bb383f1940cbfaf2477d016b0f25e0c5f9b

  • SHA512

    2131464302e83b3428d05bf717de10911de17b6abf217ef81f8b35795bed95c144d7498379bdda3ea162d664dcb936d1847d7cc481e568992b4459d07083176f

  • SSDEEP

    1536:0xZKBHG14rqH9p7ZKUBUVOhb6e7+bKn2b6l8Q/b+IOsOP6N:4WGirwDFS0hbV+bKcQD+IOsTN

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/FgmKAhUD

Targets

    • Target

      Solara.exe

    • Size

      72KB

    • MD5

      40fae76ad7eb67e5690cf09412155cb8

    • SHA1

      829a5b1b1a0ae2356e607605d8d8a8a7ea60108c

    • SHA256

      fcfd2661484f8051219cbf126a532bb383f1940cbfaf2477d016b0f25e0c5f9b

    • SHA512

      2131464302e83b3428d05bf717de10911de17b6abf217ef81f8b35795bed95c144d7498379bdda3ea162d664dcb936d1847d7cc481e568992b4459d07083176f

    • SSDEEP

      1536:0xZKBHG14rqH9p7ZKUBUVOhb6e7+bKn2b6l8Q/b+IOsOP6N:4WGirwDFS0hbV+bKcQD+IOsTN

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks