General

  • Target

    SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe

  • Size

    8.5MB

  • Sample

    250308-dtn5bs1nw5

  • MD5

    82edfa1b3ecde491c27dd45a4e1eaf2a

  • SHA1

    efdb3e54f2713b11c75e614354db267750b60c31

  • SHA256

    e2b875684ea73c67806091b51f2fb27b7f784f93435074f570a3eb463efc573a

  • SHA512

    d4ae7de28c28d17211a7806ba62ff8869bbbdecff4fca7cd7cd0c44f757345cf2cdb637fa8561892865a5d35c61f979a013c67af60431967048ea72394de1c33

  • SSDEEP

    196608:GrXsUMEtp66sGT9GZXv9WaQl+12YctXZ4m4dx0dZlt:GrTMEtPs+uFWNJnXZ4Vdx0

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:14182

figure-cement.gl.at.ply.gg:14182

Attributes
  • Install_directory

    %AppData%

  • install_file

    Loader.exe

Targets

    • Target

      SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exe

    • Size

      8.5MB

    • MD5

      82edfa1b3ecde491c27dd45a4e1eaf2a

    • SHA1

      efdb3e54f2713b11c75e614354db267750b60c31

    • SHA256

      e2b875684ea73c67806091b51f2fb27b7f784f93435074f570a3eb463efc573a

    • SHA512

      d4ae7de28c28d17211a7806ba62ff8869bbbdecff4fca7cd7cd0c44f757345cf2cdb637fa8561892865a5d35c61f979a013c67af60431967048ea72394de1c33

    • SSDEEP

      196608:GrXsUMEtp66sGT9GZXv9WaQl+12YctXZ4m4dx0dZlt:GrTMEtPs+uFWNJnXZ4Vdx0

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks