Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    SolaraV2.exe

  • Size

    2.9MB

  • Sample

    250309-whsx9axscx

  • MD5

    941c8d7c47b633c3b0cfa0d77242ae95

  • SHA1

    58fa3881583d3d9ce7ed6a9f313fe6386573154f

  • SHA256

    2cc420fbc43a2bedcf6a1bba99bda592a7a8c1735762f252cf7835c47143ef20

  • SHA512

    c544ee958de70f84f97c096493f0a518645ae917d9e7286be8edb58c00db2d9d8d7045613195463177ca54da1b71dd433b8eb26ccba8e145631e1a4087479dbd

  • SSDEEP

    49152:UbQt8UYUie2O71VYPw6oCE0AnswzlFr8SJVmle0yi+Ekhq+R74hW9auxGHSc8D6S:U8tSUTHXr46swJFoiSy1EEV7eLutcC6S

Malware Config

Extracted

Family

xworm

Version

5.0

C2

earth-northwest.gl.at.ply.gg:49617

Mutex

UwTPnsdni7XLUZ30

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      SolaraV2.exe

    • Size

      2.9MB

    • MD5

      941c8d7c47b633c3b0cfa0d77242ae95

    • SHA1

      58fa3881583d3d9ce7ed6a9f313fe6386573154f

    • SHA256

      2cc420fbc43a2bedcf6a1bba99bda592a7a8c1735762f252cf7835c47143ef20

    • SHA512

      c544ee958de70f84f97c096493f0a518645ae917d9e7286be8edb58c00db2d9d8d7045613195463177ca54da1b71dd433b8eb26ccba8e145631e1a4087479dbd

    • SSDEEP

      49152:UbQt8UYUie2O71VYPw6oCE0AnswzlFr8SJVmle0yi+Ekhq+R74hW9auxGHSc8D6S:U8tSUTHXr46swJFoiSy1EEV7eLutcC6S

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks