General

  • Target

    Output.exe

  • Size

    127KB

  • Sample

    250307-vnahestvet

  • MD5

    c5a8c92a6eae175507942fcdb7b6f4d7

  • SHA1

    b75512ae6d1da96e091a657deb49f6047e696bb4

  • SHA256

    59ae3f7403be6eb6d175e19fccc41998188e27419b4f1e3bc9e2e36f123fc36a

  • SHA512

    0796a4886d9e0f078f9a6a1e324cdfbbbfde1a991e2c2be4d764db12980f8b4b6ca743d707a1561587df4dc9d78fb71bf17cb21d3e886e1ccee28a913c44f592

  • SSDEEP

    3072:e274NpVq8BxFRzaqF+o2GQJ7/JzqVfGv2:eegVqwlL

Malware Config

Extracted

Family

xworm

Version

3.1

C2

show-commentary.gl.at.ply.gg:19243

Mutex

TJBpUvAwYAstsP7U

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Output.exe

    • Size

      127KB

    • MD5

      c5a8c92a6eae175507942fcdb7b6f4d7

    • SHA1

      b75512ae6d1da96e091a657deb49f6047e696bb4

    • SHA256

      59ae3f7403be6eb6d175e19fccc41998188e27419b4f1e3bc9e2e36f123fc36a

    • SHA512

      0796a4886d9e0f078f9a6a1e324cdfbbbfde1a991e2c2be4d764db12980f8b4b6ca743d707a1561587df4dc9d78fb71bf17cb21d3e886e1ccee28a913c44f592

    • SSDEEP

      3072:e274NpVq8BxFRzaqF+o2GQJ7/JzqVfGv2:eegVqwlL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks