General

  • Target

    Chrome.exe

  • Size

    173KB

  • Sample

    250406-n5c7baxxby

  • MD5

    3c7921e1847c67e0ea2e405dc6d39cd5

  • SHA1

    3c8307af1999b5c404208a6f99feda968f51e9e7

  • SHA256

    c351ff303cfa1788ffb81e64a468871cb243a406d5c8fa2f6ddebba52c5198c0

  • SHA512

    685a3a564e78383a44aaaca72302b2c07e260800f9dd7279812102eb759932d33898b575243fd9c0169b80901ceb63b0bce592b65eae2639268f74c136c23bd2

  • SSDEEP

    3072:WhNXZCckbL38bKROG7/4NpVq8BxFRzaqF+o2GQJ7/JzqVfGv8:ipCPb78OgVqwlL

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/sr6XiLTF

Targets

    • Target

      Chrome.exe

    • Size

      173KB

    • MD5

      3c7921e1847c67e0ea2e405dc6d39cd5

    • SHA1

      3c8307af1999b5c404208a6f99feda968f51e9e7

    • SHA256

      c351ff303cfa1788ffb81e64a468871cb243a406d5c8fa2f6ddebba52c5198c0

    • SHA512

      685a3a564e78383a44aaaca72302b2c07e260800f9dd7279812102eb759932d33898b575243fd9c0169b80901ceb63b0bce592b65eae2639268f74c136c23bd2

    • SSDEEP

      3072:WhNXZCckbL38bKROG7/4NpVq8BxFRzaqF+o2GQJ7/JzqVfGv8:ipCPb78OgVqwlL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks