General

  • Target

    Original Shipping Documents.pdf_.vbs

  • Size

    72KB

  • Sample

    250307-tfr7tstj18

  • MD5

    680c4f499e1b3ce5242349c3b7e5eb4f

  • SHA1

    2cabfc9124e28bade1772972866510c9c4442d18

  • SHA256

    dbfe1e570510947bc6faaecfb3c84ea248e7bd8da1a54a4a669b64c00dc3b54c

  • SHA512

    ce82cb6470d4afc4070ca663159aa12c1a548e503d20eaa773e307ec8539d3ced7cab0f53f14f1f001d6443f1900376a1ce0512e637f2220a1e2c76e50ce3591

  • SSDEEP

    1536:5lMsUJ3S4mY8I9tSstS3z8e9IEnHDc9EFMLSEGgcX4XTA66MrhM:5asUJ3SrI9tSskj8e+EHY9Bfja

Malware Config

Extracted

Family

xworm

Version

5.0

C2

expressblessingnow001.duckdns.org:3911

Mutex

RGibYsdTDFPkg2QK

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Original Shipping Documents.pdf_.vbs

    • Size

      72KB

    • MD5

      680c4f499e1b3ce5242349c3b7e5eb4f

    • SHA1

      2cabfc9124e28bade1772972866510c9c4442d18

    • SHA256

      dbfe1e570510947bc6faaecfb3c84ea248e7bd8da1a54a4a669b64c00dc3b54c

    • SHA512

      ce82cb6470d4afc4070ca663159aa12c1a548e503d20eaa773e307ec8539d3ced7cab0f53f14f1f001d6443f1900376a1ce0512e637f2220a1e2c76e50ce3591

    • SSDEEP

      1536:5lMsUJ3S4mY8I9tSstS3z8e9IEnHDc9EFMLSEGgcX4XTA66MrhM:5asUJ3SrI9tSskj8e+EHY9Bfja

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks