General

  • Target

    XClient.exe

  • Size

    41KB

  • Sample

    240530-xk32nshe22

  • MD5

    316fe055c2d7f8909097d57c8d37a59a

  • SHA1

    5e674edc1a5d8805b4e62b156cffb663f00a60a1

  • SHA256

    1986a85fd4e01356bf9319a6081d052a0032ad9062431eb968005808f34c925b

  • SHA512

    c774705918d19a95c9ee1fde9df63ac8db45996a44add2bc15911e2862fc68c4a0f97b063ceef1bbf0d33cd77b60932c0220df9697a2feceff28c9bfdb205f2e

  • SSDEEP

    768:i+ibOOtImfC0nKgAFm/S8CJF5PM9poc6MOwhd3Ei7:itbv6mKiKgAs/fSFS9Cc6MOwXF7

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:4431

Mutex

47kDhvQPMS0nDsrT

Attributes
  • Install_directory

    %AppData%

  • install_file

    Astral.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      41KB

    • MD5

      316fe055c2d7f8909097d57c8d37a59a

    • SHA1

      5e674edc1a5d8805b4e62b156cffb663f00a60a1

    • SHA256

      1986a85fd4e01356bf9319a6081d052a0032ad9062431eb968005808f34c925b

    • SHA512

      c774705918d19a95c9ee1fde9df63ac8db45996a44add2bc15911e2862fc68c4a0f97b063ceef1bbf0d33cd77b60932c0220df9697a2feceff28c9bfdb205f2e

    • SSDEEP

      768:i+ibOOtImfC0nKgAFm/S8CJF5PM9poc6MOwhd3Ei7:itbv6mKiKgAs/fSFS9Cc6MOwXF7

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks