Resubmissions

15/04/2025, 19:56

250415-ynn8cszpz8 10

15/04/2025, 19:53

250415-yl5sbswwg1 4

15/04/2025, 19:21

250415-x23r8swvet 10

General

  • Target

    https://bazaar.abuse.ch/download/532ccea42fbb9cbeec1ae220a6ccce867ab2fecf064e5177b7f4ec570d3304bc/

  • Sample

    250415-x23r8swvet

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://92.255.85.2/rc.mp4

Extracted

Family

xworm

Version

5.0

C2

maxbusinessworld.duckdns.org:3977

92.255.85.66:7000

Mutex

JmMnKKmFTwKVivmS

Attributes
  • install_file

    USB.exe

aes.plain
aes.plain

Extracted

Family

xworm

Version

3.1

C2

support-available.gl.at.ply.gg:3137

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://92.255.85.2/pixel.exe

exe.dropper

http://92.255.85.2/pixel.exe

Targets

    • Target

      https://bazaar.abuse.ch/download/532ccea42fbb9cbeec1ae220a6ccce867ab2fecf064e5177b7f4ec570d3304bc/

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks