General

  • Target

    XClient.exe

  • Size

    39KB

  • Sample

    240608-p91nvabh3w

  • MD5

    8ce4732c39ad60a891bcdeaa1d7b91ea

  • SHA1

    394e831be1d65ceaaf6ede383920c41b94121c61

  • SHA256

    948af5c145a4d749dfaf8cd9fbaf4fa16765cc24e261765c341cda6993f799de

  • SHA512

    ab5a676c2809333680986a9c28b22d4fdc2d9b30ce08eef5e015a85521ba9dc87a0f71c512c099b8dd71064ed876f7b0d4bb890307e2aa7030d0864a01b517d3

  • SSDEEP

    768:r9EAZ3FrcogEoBVLQWLFw7aCAAxF5PQ9jdG6gOMh/3Ik:rXpFr1gE+9Q57BFy9RG6gOMBf

Malware Config

Extracted

Family

xworm

Version

5.0

C2

192.168.43.89:7000

Mutex

yBUWL9boyyfdiYH3

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      39KB

    • MD5

      8ce4732c39ad60a891bcdeaa1d7b91ea

    • SHA1

      394e831be1d65ceaaf6ede383920c41b94121c61

    • SHA256

      948af5c145a4d749dfaf8cd9fbaf4fa16765cc24e261765c341cda6993f799de

    • SHA512

      ab5a676c2809333680986a9c28b22d4fdc2d9b30ce08eef5e015a85521ba9dc87a0f71c512c099b8dd71064ed876f7b0d4bb890307e2aa7030d0864a01b517d3

    • SSDEEP

      768:r9EAZ3FrcogEoBVLQWLFw7aCAAxF5PQ9jdG6gOMh/3Ik:rXpFr1gE+9Q57BFy9RG6gOMBf

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks