General

  • Target

    28132ef9c24ea461015be0ca1a6f775d28e36c28d59df1f24a0527aa5c043695_NeikiAnalytics.exe

  • Size

    37KB

  • Sample

    240701-a39wls1bqb

  • MD5

    a1e092a1d81eb20d8d5904b6cbab7160

  • SHA1

    333fb684353cc1e8dfe6206cd3b9721c5574a05d

  • SHA256

    28132ef9c24ea461015be0ca1a6f775d28e36c28d59df1f24a0527aa5c043695

  • SHA512

    883088a4ebb323698f50fcad2db43a88c96bc6379eabeb1b169b097ba8f4fa9b4d48390e5f24c5b3d3ca15b105121739987dcb5514aa58b441ae777930901537

  • SSDEEP

    768:H5gTXwbLsAheofRhTUOe9tLFyc9PoO/hiDy0R:H5gTgUAhHKOSF39PoO/R0R

Malware Config

Extracted

Family

xworm

Version

5.0

C2

modern-educators.gl.at.ply.gg:23695

Mutex

8N14jzyvJ63EProc

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      28132ef9c24ea461015be0ca1a6f775d28e36c28d59df1f24a0527aa5c043695_NeikiAnalytics.exe

    • Size

      37KB

    • MD5

      a1e092a1d81eb20d8d5904b6cbab7160

    • SHA1

      333fb684353cc1e8dfe6206cd3b9721c5574a05d

    • SHA256

      28132ef9c24ea461015be0ca1a6f775d28e36c28d59df1f24a0527aa5c043695

    • SHA512

      883088a4ebb323698f50fcad2db43a88c96bc6379eabeb1b169b097ba8f4fa9b4d48390e5f24c5b3d3ca15b105121739987dcb5514aa58b441ae777930901537

    • SSDEEP

      768:H5gTXwbLsAheofRhTUOe9tLFyc9PoO/hiDy0R:H5gTgUAhHKOSF39PoO/R0R

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks