General

  • Target

    MSCHF_Logger.exe

  • Size

    101KB

  • Sample

    240726-sx3jfswenj

  • MD5

    611f2714a547bab8320f659449111ff4

  • SHA1

    1f74f554a74a29b66f098861c75d2d23ddfd3493

  • SHA256

    c97cd4989d79bcf61de50853df9f71990ac66a010b8711af55602112bb6edab6

  • SHA512

    190bb92559a7c71ad71e9636923655ec51b3c017a6fcaba8efc5f62fb600a37354683392c3da7aecf083ece7b45f31995bfc642501f580bf242e12216a143ddc

  • SSDEEP

    3072:jIjZe1uHQiezBD/QM8tjml3IOSy6Eo5n:jus12QieVbQjml3IOStEo

Malware Config

Extracted

Family

xworm

C2

shxrd-41341.portmap.host:41341

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      MSCHF_Logger.exe

    • Size

      101KB

    • MD5

      611f2714a547bab8320f659449111ff4

    • SHA1

      1f74f554a74a29b66f098861c75d2d23ddfd3493

    • SHA256

      c97cd4989d79bcf61de50853df9f71990ac66a010b8711af55602112bb6edab6

    • SHA512

      190bb92559a7c71ad71e9636923655ec51b3c017a6fcaba8efc5f62fb600a37354683392c3da7aecf083ece7b45f31995bfc642501f580bf242e12216a143ddc

    • SSDEEP

      3072:jIjZe1uHQiezBD/QM8tjml3IOSy6Eo5n:jus12QieVbQjml3IOStEo

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks