General

  • Target

    b381f1f4bad4016f464ceb92aeb9dda3b696411d913ea7f3bbc774b67076c43f

  • Size

    108KB

  • Sample

    240701-b4pgqssdma

  • MD5

    557caa60b4c2b17a6ddd4da49d778b33

  • SHA1

    f5f12131479f08e4305ab9b51ba415d72ccb28c1

  • SHA256

    b381f1f4bad4016f464ceb92aeb9dda3b696411d913ea7f3bbc774b67076c43f

  • SHA512

    7e6113a678fe35109432e7767492f9cd91b7cdb042af2cc36d70973efaa7cf131270b16209a107ab3da158723d03791910977f53c7640c67fcf59bd37d2626d1

  • SSDEEP

    1536:lIs9UNbZlC6wdGNKZpPNb3JWoDTUa6PvaiOAfViA6X:lIAoLpaG4pNb36bX1OAfkAw

Malware Config

Extracted

Family

xworm

C2

193.161.193.99:51146

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot6701075763:AAGkvv2CpqBxGihH8FtOkSA7Uxy35GZpAFI/sendMessage?chat_id=5991331733

Targets

    • Target

      b381f1f4bad4016f464ceb92aeb9dda3b696411d913ea7f3bbc774b67076c43f

    • Size

      108KB

    • MD5

      557caa60b4c2b17a6ddd4da49d778b33

    • SHA1

      f5f12131479f08e4305ab9b51ba415d72ccb28c1

    • SHA256

      b381f1f4bad4016f464ceb92aeb9dda3b696411d913ea7f3bbc774b67076c43f

    • SHA512

      7e6113a678fe35109432e7767492f9cd91b7cdb042af2cc36d70973efaa7cf131270b16209a107ab3da158723d03791910977f53c7640c67fcf59bd37d2626d1

    • SSDEEP

      1536:lIs9UNbZlC6wdGNKZpPNb3JWoDTUa6PvaiOAfViA6X:lIAoLpaG4pNb36bX1OAfkAw

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects executables using Telegram Chat Bot

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks