General

  • Target

    https://github.com/farrrrrzad/haha/blob/main/XClient.exe

  • Sample

    240325-s1ypnsbh76

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Attributes
  • Install_directory

    %Public%

  • install_file

    SteamCracked.exe

  • telegram

    https://api.telegram.org/bot7082888193:AAEZ-QonUE57h7crcRYyMzZXt4Pa9br_3xA/sendMessage?chat_id=6044060082

Targets

    • Target

      https://github.com/farrrrrzad/haha/blob/main/XClient.exe

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks