General

  • Target

    NexarX.exe

  • Size

    131KB

  • Sample

    240613-vfwqpa1dkl

  • MD5

    b829b2384e2a323c97911fc40af01cab

  • SHA1

    3c417e79cb299bab044a90f8f223c2518d21067e

  • SHA256

    30d3a95753e9f24c12a1aea7c8224b10dbfaada9685ea79c42e874ccaf889b7b

  • SHA512

    b3ccf932052bda6e959b0f4f5a3c6f0f0269a8e8b4598854a11f4d22883b0b5ba3a475fa4143007a39466a8a7d14c15c65c71068a11986f78b8f50780e9f329f

  • SSDEEP

    3072:c0QJLJ4bAewmZRZODY3AYj/aK5VBQ45nTe1sXi63qhzzAHnmOg2:c1LCbYmZbAYf5735Te1sS661unmOg

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      NexarX.exe

    • Size

      131KB

    • MD5

      b829b2384e2a323c97911fc40af01cab

    • SHA1

      3c417e79cb299bab044a90f8f223c2518d21067e

    • SHA256

      30d3a95753e9f24c12a1aea7c8224b10dbfaada9685ea79c42e874ccaf889b7b

    • SHA512

      b3ccf932052bda6e959b0f4f5a3c6f0f0269a8e8b4598854a11f4d22883b0b5ba3a475fa4143007a39466a8a7d14c15c65c71068a11986f78b8f50780e9f329f

    • SSDEEP

      3072:c0QJLJ4bAewmZRZODY3AYj/aK5VBQ45nTe1sXi63qhzzAHnmOg2:c1LCbYmZbAYf5735Te1sS661unmOg

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks