General

  • Target

    XCl11ient.exe

  • Size

    198KB

  • Sample

    240525-etscesea9w

  • MD5

    ad23c3ed0a57035ec1e96821af565e9c

  • SHA1

    bbb6a5195e6595bf0b0f9afcd0edcbd6da37204c

  • SHA256

    99622679495f7f3e9ce02aaaa8a62d16ad385efe204f0d59059df0e51607dec5

  • SHA512

    c2de4832bbcda8ef69213ed3d4a04ccecf2761208c8b918d5b6d8a401ed5566ac11486fb2dafe89daf167d6d940b4633cdfbbba09578dc6bca404931391cee7d

  • SSDEEP

    3072:T0GuY3knJR+b5Pvcc+iewCDOwRk8RUGKXs+S++7KFSbxeY+qDDrMf:T0RsknibJvF5GqStKEbxI

Malware Config

Targets

    • Target

      XCl11ient.exe

    • Size

      198KB

    • MD5

      ad23c3ed0a57035ec1e96821af565e9c

    • SHA1

      bbb6a5195e6595bf0b0f9afcd0edcbd6da37204c

    • SHA256

      99622679495f7f3e9ce02aaaa8a62d16ad385efe204f0d59059df0e51607dec5

    • SHA512

      c2de4832bbcda8ef69213ed3d4a04ccecf2761208c8b918d5b6d8a401ed5566ac11486fb2dafe89daf167d6d940b4633cdfbbba09578dc6bca404931391cee7d

    • SSDEEP

      3072:T0GuY3knJR+b5Pvcc+iewCDOwRk8RUGKXs+S++7KFSbxeY+qDDrMf:T0RsknibJvF5GqStKEbxI

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks