General

  • Target

    Oakland.s.exe

  • Size

    928KB

  • Sample

    250520-yz5pgs1pz4

  • MD5

    fdab6978453aeffcb72bcc0ff94cc4e8

  • SHA1

    7b7da9150c500203af14bcfca041f6f840dbde9f

  • SHA256

    7261ced152c3722def6aaf9fe1cf42d417ff23713cfb674557a64401c45fd68b

  • SHA512

    afaf5f44abbd23fb57b6b256329747b3ef3cc702647afb590aa8a8197f360e3a351d53ffbb0f2c516b9861f0c4fe1b044cd0b35283d338878346a618641ef88b

  • SSDEEP

    12288:pwMvFakGNIbkRtU7WF3Ab/R0LfzoDBEhFArPJ4qIcY+hHbJbrcXFBfmXs/hcLaIY:qFtBhmrPJpYSHCLuc/NUFc+OFc+

Malware Config

Extracted

Family

xworm

Version

5.0

C2

104.234.124.55:3360

Mutex

P737CuJH08tJnvsR

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Oakland.s.exe

    • Size

      928KB

    • MD5

      fdab6978453aeffcb72bcc0ff94cc4e8

    • SHA1

      7b7da9150c500203af14bcfca041f6f840dbde9f

    • SHA256

      7261ced152c3722def6aaf9fe1cf42d417ff23713cfb674557a64401c45fd68b

    • SHA512

      afaf5f44abbd23fb57b6b256329747b3ef3cc702647afb590aa8a8197f360e3a351d53ffbb0f2c516b9861f0c4fe1b044cd0b35283d338878346a618641ef88b

    • SSDEEP

      12288:pwMvFakGNIbkRtU7WF3Ab/R0LfzoDBEhFArPJ4qIcY+hHbJbrcXFBfmXs/hcLaIY:qFtBhmrPJpYSHCLuc/NUFc+OFc+

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks