General

  • Target

    injector.msi

  • Size

    1.2MB

  • Sample

    250308-l5p5rsvxas

  • MD5

    f2ab259a57ce31c7a61cdb4266f28a58

  • SHA1

    91569473b6fea4dc90541e25d2239cf7b1ade8ae

  • SHA256

    2d6e6b6590d2541da93aaf4690fec839fc56fbabcbd110d18f3d53ae4105c012

  • SHA512

    bec918973d2aa44411b5ff1c003a50180dc50b9c19f3fa23776337e99d94757c4c0ec39b39cb4d1bc5fb5c68675b45a2c26eb5e45aaea67479c88161e3be8353

  • SSDEEP

    24576:gt9cpVDhtnJlL52UoehMFc+8CrgyZRcO/WrtrDFJIGL5UGWq:/pRhtJB5RbKF7nzZ0ZJb

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    injector.exe

  • pastebin_url

    https://pastebin.com/raw/DSFaHH8B

Targets

    • Target

      injector.msi

    • Size

      1.2MB

    • MD5

      f2ab259a57ce31c7a61cdb4266f28a58

    • SHA1

      91569473b6fea4dc90541e25d2239cf7b1ade8ae

    • SHA256

      2d6e6b6590d2541da93aaf4690fec839fc56fbabcbd110d18f3d53ae4105c012

    • SHA512

      bec918973d2aa44411b5ff1c003a50180dc50b9c19f3fa23776337e99d94757c4c0ec39b39cb4d1bc5fb5c68675b45a2c26eb5e45aaea67479c88161e3be8353

    • SSDEEP

      24576:gt9cpVDhtnJlL52UoehMFc+8CrgyZRcO/WrtrDFJIGL5UGWq:/pRhtJB5RbKF7nzZ0ZJb

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Modifies file permissions

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks