General

  • Target

    XClient.exe

  • Size

    65KB

  • Sample

    240422-be7a9adc83

  • MD5

    f89900bee0847f4f1e23b1bfda0e7f24

  • SHA1

    24dd536801cff4b3b92276a52a9280069290149a

  • SHA256

    82f0fb933a96858aabe6b741c889611583a0a11132ee6ecd70909fc0aa6cf534

  • SHA512

    bba995bfb14d6d79b8f4feb0934888d2e5d39d7c945cce2046e842a0c0240cc14a9998c3d18093c29ca36c840f580058518df341e0dca3f5452fdc7fcacdcc3a

  • SSDEEP

    1536:/JPMoSzJ4aZfY0by1DLub8ldJJIrlXOF3+v/:BZcJm0WxSb8elXOhW/

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:33920

original-taught.gl.at.ply.gg:33920

Attributes
  • Install_directory

    %AppData%

  • install_file

    FreePornHubPremium.exe

Targets

    • Target

      XClient.exe

    • Size

      65KB

    • MD5

      f89900bee0847f4f1e23b1bfda0e7f24

    • SHA1

      24dd536801cff4b3b92276a52a9280069290149a

    • SHA256

      82f0fb933a96858aabe6b741c889611583a0a11132ee6ecd70909fc0aa6cf534

    • SHA512

      bba995bfb14d6d79b8f4feb0934888d2e5d39d7c945cce2046e842a0c0240cc14a9998c3d18093c29ca36c840f580058518df341e0dca3f5452fdc7fcacdcc3a

    • SSDEEP

      1536:/JPMoSzJ4aZfY0by1DLub8ldJJIrlXOF3+v/:BZcJm0WxSb8elXOhW/

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks