General

  • Target

    XClient.exe

  • Size

    71KB

  • Sample

    240622-evkzqs1fqp

  • MD5

    f7fb159677952ff626ea36fe4d70b407

  • SHA1

    7db19c9f853eb567e75efd5231db21f24d2949b7

  • SHA256

    fde063cbe24247f81a22924e7e41477052d15aabf9142815903433a49e9f9941

  • SHA512

    224df3dd10d557349210974834e07acb81fdf7443e04e53b9e54d08311c8c693ed5db9975d91f13d1d5c788dfc6d681f7258a10d3d30080ce5876818fcdf8373

  • SSDEEP

    1536:fuHNLhpEWALYZMvShbpNLY7jG6RHOb5/CVNNKn0:48TLghbpCjpOb5/mNO0

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:12550

192.168.0.13:12550

192.168.0.1:12550

109.187.92.93:12550

109.187.64.1:12550

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      XClient.exe

    • Size

      71KB

    • MD5

      f7fb159677952ff626ea36fe4d70b407

    • SHA1

      7db19c9f853eb567e75efd5231db21f24d2949b7

    • SHA256

      fde063cbe24247f81a22924e7e41477052d15aabf9142815903433a49e9f9941

    • SHA512

      224df3dd10d557349210974834e07acb81fdf7443e04e53b9e54d08311c8c693ed5db9975d91f13d1d5c788dfc6d681f7258a10d3d30080ce5876818fcdf8373

    • SSDEEP

      1536:fuHNLhpEWALYZMvShbpNLY7jG6RHOb5/CVNNKn0:48TLghbpCjpOb5/mNO0

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • XenArmor Suite

      XenArmor is as suite of password recovery tools for various application.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks