Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    XWorm V5.2.rar

  • Size

    50.1MB

  • Sample

    240802-2sgkvsteml

  • MD5

    9708d19fa9f583748f252f35606a84e8

  • SHA1

    9817368991be44c479eef076338361455efb90f2

  • SHA256

    6bde76de6064f5cb941da866a26b81f18d4a7e3d738d416238fa73c0b01149a7

  • SHA512

    d7a829b3001e45ac69ff521d7c8a94739d520abaf46fd8b6426b58faed73f296310c8990c5bd0dd17b2efd55efd2698c37fe5b7fa169aa3378abb268ebc3170a

  • SSDEEP

    1572864:v35cgiPnjmoHYeSF+v88It5VCpbmrfi37J:vJcpPS9208mHCIzirJ

Malware Config

Extracted

Family

xworm

C2

31.167.24.129:7000

154.61.71.50:7000

2.90.87.156:7000

86.96.100.98:7000

Attributes
  • Install_directory

    %Temp%

  • install_file

    USB.exe

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

JYj1EIwWwj45bGVr

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      41KB

    • MD5

      f065a5f352973e89b2e8d3efd79b98f8

    • SHA1

      6a9a84e0a11010262ea35790fcdf824193805c76

    • SHA256

      7b75950ae4eeabfdedafe9e3b14acee160a6ad932cbad66f71fe5bca32cc6405

    • SHA512

      b920e46653ec87748767e71e88593db3c6d25fcde1b63504a1718d438e383c15578fd9e5bae5665b040e0f3512566ec99322eb8f3b5a0fa2112934ad486a2006

    • SSDEEP

      768:2+ibOPCt0LxOg3XvgggzLJF5PG9pmE6vOwhF3EizW:2tbuCiL0WXvvgpFI9AE6vOwjF6

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks