General

  • Target

    XClient.exe

  • Size

    63KB

  • Sample

    240608-m6f4xsba4z

  • MD5

    771eeac6ba18a3ce81c5ccb3ecb54bb3

  • SHA1

    85148f90d8c62ea98acd69bdbc574ee609d93d22

  • SHA256

    833731cce3a2960ff61cb354f003570e2e14a059c1e259a4c0be7a716767d7dd

  • SHA512

    8a8fee68af11a3cdcd2b3be8be76c9eb31b7c816dbb5c9f87a3cfc041c6241c4b62a03c4872a8805f1c30522febd68c299f9f5325317d4c0e57e07ab0b27b043

  • SSDEEP

    1536:yt29HwwrKua7WvS3btT+bb0ts3+3G6wVO+QTr1ww2:yKHwwr1i3hT+bben3oVO+Qf1P2

Malware Config

Extracted

Family

xworm

C2

192.168.56.1:7000

Attributes
  • install_file

    USB.exe

Targets

    • Target

      XClient.exe

    • Size

      63KB

    • MD5

      771eeac6ba18a3ce81c5ccb3ecb54bb3

    • SHA1

      85148f90d8c62ea98acd69bdbc574ee609d93d22

    • SHA256

      833731cce3a2960ff61cb354f003570e2e14a059c1e259a4c0be7a716767d7dd

    • SHA512

      8a8fee68af11a3cdcd2b3be8be76c9eb31b7c816dbb5c9f87a3cfc041c6241c4b62a03c4872a8805f1c30522febd68c299f9f5325317d4c0e57e07ab0b27b043

    • SSDEEP

      1536:yt29HwwrKua7WvS3btT+bb0ts3+3G6wVO+QTr1ww2:yKHwwr1i3hT+bben3oVO+Qf1P2

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

System Information Discovery

1
T1082

Tasks