Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    ратник.exe

  • Size

    62KB

  • Sample

    240723-n6h4ysvcja

  • MD5

    f5d67f4988d18fb4b52e7de4ad75168d

  • SHA1

    b1f3b4d40d3a5e177ec04c478d6a02f85d57e35c

  • SHA256

    3c9f38093ef7ca9ff110fdb5cff7fcb4c8eec737536181561e75410a88a9d465

  • SHA512

    32223a0e6f50608d992556a4de81f72c3fd62646ea8e340729addfeca02b686dfa450f591c82c2e564d164b62e08a0aaf543dd9c0d3835194d69d279554e79f0

  • SSDEEP

    1536:DLxX5T7Oxst3AExTPCObC9+raFgC6lFKJOHhxL:DltcsmEwObCE7EJOHjL

Malware Config

Extracted

Family

xworm

C2

stores-achieved.gl.at.ply.gg:64510

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      ратник.exe

    • Size

      62KB

    • MD5

      f5d67f4988d18fb4b52e7de4ad75168d

    • SHA1

      b1f3b4d40d3a5e177ec04c478d6a02f85d57e35c

    • SHA256

      3c9f38093ef7ca9ff110fdb5cff7fcb4c8eec737536181561e75410a88a9d465

    • SHA512

      32223a0e6f50608d992556a4de81f72c3fd62646ea8e340729addfeca02b686dfa450f591c82c2e564d164b62e08a0aaf543dd9c0d3835194d69d279554e79f0

    • SSDEEP

      1536:DLxX5T7Oxst3AExTPCObC9+raFgC6lFKJOHhxL:DltcsmEwObCE7EJOHjL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks