General

  • Target

    02b66e1529ad66316c48c1da16afddd79f8c526de0acc5937b590bde73fd4a85

  • Size

    65KB

  • Sample

    240608-wt6ngsfa56

  • MD5

    6a7f3ecf7316ac97c5ec2e6ff98bb2eb

  • SHA1

    09c0051236a026bc212ee8dcaacc3d5ba07d635f

  • SHA256

    02b66e1529ad66316c48c1da16afddd79f8c526de0acc5937b590bde73fd4a85

  • SHA512

    612432852f0e9e096c3471e111f3f9db66820cb02f9bef4f79069ef5fc8a39bba3ffba4d3356c40e68bcca183c5e88529dd60bb1800374ec88cc1aaca23838dd

  • SSDEEP

    1536:Jwwaeov1jn8KciqTqbXb7KauCIIf6hExTMOlsCNd5v:ewovDBGqbXb7b3DoOlsC9v

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:8848

mb-each.gl.at.ply.gg:8848

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    XClient.exe

Targets

    • Target

      02b66e1529ad66316c48c1da16afddd79f8c526de0acc5937b590bde73fd4a85

    • Size

      65KB

    • MD5

      6a7f3ecf7316ac97c5ec2e6ff98bb2eb

    • SHA1

      09c0051236a026bc212ee8dcaacc3d5ba07d635f

    • SHA256

      02b66e1529ad66316c48c1da16afddd79f8c526de0acc5937b590bde73fd4a85

    • SHA512

      612432852f0e9e096c3471e111f3f9db66820cb02f9bef4f79069ef5fc8a39bba3ffba4d3356c40e68bcca183c5e88529dd60bb1800374ec88cc1aaca23838dd

    • SSDEEP

      1536:Jwwaeov1jn8KciqTqbXb7KauCIIf6hExTMOlsCNd5v:ewovDBGqbXb7b3DoOlsC9v

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Detects Windows executables referencing non-Windows User-Agents

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks