Resubmissions

06/04/2025, 17:09

250406-vpgm5atyez 10

06/04/2025, 17:01

250406-vjm8qatxew 10

06/04/2025, 11:39

250406-nsrtyazmw9 10

General

  • Target

    Chrome.exe

  • Size

    173KB

  • Sample

    250406-nsrtyazmw9

  • MD5

    3c7921e1847c67e0ea2e405dc6d39cd5

  • SHA1

    3c8307af1999b5c404208a6f99feda968f51e9e7

  • SHA256

    c351ff303cfa1788ffb81e64a468871cb243a406d5c8fa2f6ddebba52c5198c0

  • SHA512

    685a3a564e78383a44aaaca72302b2c07e260800f9dd7279812102eb759932d33898b575243fd9c0169b80901ceb63b0bce592b65eae2639268f74c136c23bd2

  • SSDEEP

    3072:WhNXZCckbL38bKROG7/4NpVq8BxFRzaqF+o2GQJ7/JzqVfGv8:ipCPb78OgVqwlL

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/sr6XiLTF

Targets

    • Target

      Chrome.exe

    • Size

      173KB

    • MD5

      3c7921e1847c67e0ea2e405dc6d39cd5

    • SHA1

      3c8307af1999b5c404208a6f99feda968f51e9e7

    • SHA256

      c351ff303cfa1788ffb81e64a468871cb243a406d5c8fa2f6ddebba52c5198c0

    • SHA512

      685a3a564e78383a44aaaca72302b2c07e260800f9dd7279812102eb759932d33898b575243fd9c0169b80901ceb63b0bce592b65eae2639268f74c136c23bd2

    • SSDEEP

      3072:WhNXZCckbL38bKROG7/4NpVq8BxFRzaqF+o2GQJ7/JzqVfGv8:ipCPb78OgVqwlL

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks