General

  • Target

    GTAGLagPatcher.exe

  • Size

    70KB

  • Sample

    240504-1m8lqacb91

  • MD5

    a465ea357cae35a66da7279a592e25c5

  • SHA1

    fb20362c444ea4fbdc14597b78eee66c5b9c2a44

  • SHA256

    fb74bd701a497dc3451d70bb8ed961303c6a6552fbcfc0c685015163748cdf12

  • SHA512

    bc88851b92eb39cc22a41f1e6d6425fa061b8e1abdc8a9f0b51d76f67df38158fbc19872f9b2ccc4a50e090067a11f047bbf5b282dea35118636bdc0c3dd4210

  • SSDEEP

    1536:UQKOINQ8A4A3inaxLUPs9bfI86cT06POOoNQFMEX:UfrNQ8A4As6Ks9bf3dOfNg9X

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:33292

corporation-ver.gl.at.ply.gg:33292

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      GTAGLagPatcher.exe

    • Size

      70KB

    • MD5

      a465ea357cae35a66da7279a592e25c5

    • SHA1

      fb20362c444ea4fbdc14597b78eee66c5b9c2a44

    • SHA256

      fb74bd701a497dc3451d70bb8ed961303c6a6552fbcfc0c685015163748cdf12

    • SHA512

      bc88851b92eb39cc22a41f1e6d6425fa061b8e1abdc8a9f0b51d76f67df38158fbc19872f9b2ccc4a50e090067a11f047bbf5b282dea35118636bdc0c3dd4210

    • SSDEEP

      1536:UQKOINQ8A4A3inaxLUPs9bfI86cT06POOoNQFMEX:UfrNQ8A4As6Ks9bf3dOfNg9X

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks