General

  • Target

    XClient.exe

  • Size

    70KB

  • Sample

    240615-fefwhsyhqd

  • MD5

    77e09e515d37ed1137977c0e3474c2ab

  • SHA1

    1f3ab7181f22723e75aaa8ff95fa273de71e0cf8

  • SHA256

    e1a08988b3576c62be060b2b616d3ccae01e32484e5206e98cd18c00350f1042

  • SHA512

    3365e00fad9daf82b9d984e5ff28702643d3468ef4a4abf9a3dc1abf2328f837e93a262314a7862a8dc814bb1279eb825e7877b2f2fbcbc11840224c470bb622

  • SSDEEP

    1536:y+6Nj6m3Gr/ecc7aW5bTnZ0Dj6lr7OSiJt9p:r4jAWcu5bTZuK/OSWz

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    rundll64.exe

Targets

    • Target

      XClient.exe

    • Size

      70KB

    • MD5

      77e09e515d37ed1137977c0e3474c2ab

    • SHA1

      1f3ab7181f22723e75aaa8ff95fa273de71e0cf8

    • SHA256

      e1a08988b3576c62be060b2b616d3ccae01e32484e5206e98cd18c00350f1042

    • SHA512

      3365e00fad9daf82b9d984e5ff28702643d3468ef4a4abf9a3dc1abf2328f837e93a262314a7862a8dc814bb1279eb825e7877b2f2fbcbc11840224c470bb622

    • SSDEEP

      1536:y+6Nj6m3Gr/ecc7aW5bTnZ0Dj6lr7OSiJt9p:r4jAWcu5bTZuK/OSWz

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks