General

  • Target

    XClient.exe

  • Size

    72KB

  • Sample

    240531-jz262acg88

  • MD5

    dab9e10b713779e5a811a1c89ae6252a

  • SHA1

    fea8c8140c6b13fabdb258acb3a646c1a54e36be

  • SHA256

    e712b1e3a9313d86fce1ca310401f88e8fcda3c2b65ff9633613018bac09012f

  • SHA512

    ad6f6b0a0b1ce606964e1fa1ddd3ccef30fa2f90b1af3e57108b7a30aeb43aa02e64b407b519e1463597f4147f639eb1d09d4c0717127da8700d2998929b03fe

  • SSDEEP

    1536:XdqJfIiYkjEj1xFhI6mX1EgjbDhcb6rOFw2Uy:SlYJBjXkNjbDXOFwHy

Malware Config

Extracted

Family

xworm

C2

isbn-employee.gl.at.ply.gg:4328

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      XClient.exe

    • Size

      72KB

    • MD5

      dab9e10b713779e5a811a1c89ae6252a

    • SHA1

      fea8c8140c6b13fabdb258acb3a646c1a54e36be

    • SHA256

      e712b1e3a9313d86fce1ca310401f88e8fcda3c2b65ff9633613018bac09012f

    • SHA512

      ad6f6b0a0b1ce606964e1fa1ddd3ccef30fa2f90b1af3e57108b7a30aeb43aa02e64b407b519e1463597f4147f639eb1d09d4c0717127da8700d2998929b03fe

    • SSDEEP

      1536:XdqJfIiYkjEj1xFhI6mX1EgjbDhcb6rOFw2Uy:SlYJBjXkNjbDXOFwHy

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks