General

  • Target

    12333.exe

  • Size

    72KB

  • Sample

    240510-klt4yagd94

  • MD5

    2554e1b2a7e231579a3dc5a7ef73ad74

  • SHA1

    4c2ddcc5f5767faddcf993ecb844eb5a953447b4

  • SHA256

    a2244382b959f9f488973d88e1b621dbfb4471dff5611b2e73d42939fbc9c99f

  • SHA512

    1bd0ce3e20dee75cde52939cd598bf092579caea097aad262c2b7fad40bf62c4c3992ef17481f0fb930bec0d8b0cd861806794baf23f5fd8d5e067ac789885c2

  • SSDEEP

    1536:V1haBqJvZMBL75Zp+bVs9M5EU6whobjOQ3mMpt9iVegGe:VL/kDp+bVs9nuobjOm9pLAIe

Malware Config

Extracted

Family

xworm

C2

0.tcp.jp.ngrok.io:17019

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      12333.exe

    • Size

      72KB

    • MD5

      2554e1b2a7e231579a3dc5a7ef73ad74

    • SHA1

      4c2ddcc5f5767faddcf993ecb844eb5a953447b4

    • SHA256

      a2244382b959f9f488973d88e1b621dbfb4471dff5611b2e73d42939fbc9c99f

    • SHA512

      1bd0ce3e20dee75cde52939cd598bf092579caea097aad262c2b7fad40bf62c4c3992ef17481f0fb930bec0d8b0cd861806794baf23f5fd8d5e067ac789885c2

    • SSDEEP

      1536:V1haBqJvZMBL75Zp+bVs9M5EU6whobjOQ3mMpt9iVegGe:VL/kDp+bVs9nuobjOm9pLAIe

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks