General

  • Target

    Spyroid VIP Cracked.exe

  • Size

    68KB

  • Sample

    240725-pacgza1bnd

  • MD5

    73d56569fee0443114d04948f89f7ddb

  • SHA1

    1d24bbf228226c5ad19639a48c1122eb01d3a7b6

  • SHA256

    9274f916ced7e5c02d913f3015f0db9d042d8405d373b1e291ac5eb646325ab4

  • SHA512

    be5d02ccc315c5d23a6763838d78e7431e35b6c8d2f65dd22999b04c5c614ece3dfbecdfb285e1bde9d3c258889d85fd2e051fed5491f88c814df05e70f82596

  • SSDEEP

    768:zAgfeFfd6BVFuSUaU/mCMuOSI6imxI+bFIn9mP3li2wx64O0kHMvhcZu2F:cgfeF1yHUhkLrkpbFIe3s2W64O0fMLF

Malware Config

Extracted

Family

xworm

C2

inn-ht.gl.at.ply.gg:60031

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      Spyroid VIP Cracked.exe

    • Size

      68KB

    • MD5

      73d56569fee0443114d04948f89f7ddb

    • SHA1

      1d24bbf228226c5ad19639a48c1122eb01d3a7b6

    • SHA256

      9274f916ced7e5c02d913f3015f0db9d042d8405d373b1e291ac5eb646325ab4

    • SHA512

      be5d02ccc315c5d23a6763838d78e7431e35b6c8d2f65dd22999b04c5c614ece3dfbecdfb285e1bde9d3c258889d85fd2e051fed5491f88c814df05e70f82596

    • SSDEEP

      768:zAgfeFfd6BVFuSUaU/mCMuOSI6imxI+bFIn9mP3li2wx64O0kHMvhcZu2F:cgfeF1yHUhkLrkpbFIe3s2W64O0fMLF

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks