Resubmissions

31/03/2025, 15:18

250331-spmg9svnx6 1

31/03/2025, 15:14

250331-smb9hsswbz 10

General

  • Target

    Security.msi

  • Size

    444KB

  • Sample

    250331-smb9hsswbz

  • MD5

    2a483b7d8f9f70e6abb6a6b5193bfdbf

  • SHA1

    10ce8a8d4ef944ba2ff5d101c9c34a597012f182

  • SHA256

    f9b1b482d5eaf4ae4892fe8a5af1e66f5ace1f3f582e1638b68494867b326521

  • SHA512

    733ec6b41f7d98f5df6a33c3cb2eed93df846a3c2ed8082d073277a3d7e1b54d75c091bc57f48958265d57caec0e292075218277b85a1601f22584e9179748e3

  • SSDEEP

    12288:8tVRQ+gjpjegDro86la3QNTcw2gWOj36:8t9cpVDh6WQNYxz

Malware Config

Extracted

Family

xworm

Version

3.1

C2

respect-hits.gl.at.ply.gg:53989

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      Security.msi

    • Size

      444KB

    • MD5

      2a483b7d8f9f70e6abb6a6b5193bfdbf

    • SHA1

      10ce8a8d4ef944ba2ff5d101c9c34a597012f182

    • SHA256

      f9b1b482d5eaf4ae4892fe8a5af1e66f5ace1f3f582e1638b68494867b326521

    • SHA512

      733ec6b41f7d98f5df6a33c3cb2eed93df846a3c2ed8082d073277a3d7e1b54d75c091bc57f48958265d57caec0e292075218277b85a1601f22584e9179748e3

    • SSDEEP

      12288:8tVRQ+gjpjegDro86la3QNTcw2gWOj36:8t9cpVDh6WQNYxz

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Modifies file permissions

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks