General
-
Target
XWorm V5.2.zip
-
Size
94.9MB
-
Sample
240802-3dgsrazajb
-
MD5
ae4285fdfaf01e9533b954f7460a1654
-
SHA1
7a04495442db3e801c1d9fa3491e3ba04f76073c
-
SHA256
3e9a0998c2f1af74e4055ac67035f3db0212901ed273278dfcea9015f4deaa5b
-
SHA512
888547bbaf720fccf00dc1f7ade83b4b5608efc67b5d1184e8e5859fd5fbd263fd9ccc60369592b17f4cf05ee529355bf34f9a0ee67e1a88e9139bf9fb3bafaa
-
SSDEEP
1572864:cXjrCTvb2gXxrCTvbEcU8IrNhMXLe2KOJQ0/4lsb+LHU8IrNhMXLe2KMZQ0/4H+k:cn9gldEeNSjJJ/4X/eNSjZJ/4bT9G4
Behavioral task
behavioral1
Sample
XWorm V5.2.zip
Resource
win7-20240708-en
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/H3wFXmEi
Extracted
xworm
5.0
127.0.0.1:7000
JYj1EIwWwj45bGVr
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XWorm V5.2.zip
-
Size
94.9MB
-
MD5
ae4285fdfaf01e9533b954f7460a1654
-
SHA1
7a04495442db3e801c1d9fa3491e3ba04f76073c
-
SHA256
3e9a0998c2f1af74e4055ac67035f3db0212901ed273278dfcea9015f4deaa5b
-
SHA512
888547bbaf720fccf00dc1f7ade83b4b5608efc67b5d1184e8e5859fd5fbd263fd9ccc60369592b17f4cf05ee529355bf34f9a0ee67e1a88e9139bf9fb3bafaa
-
SSDEEP
1572864:cXjrCTvb2gXxrCTvbEcU8IrNhMXLe2KOJQ0/4lsb+LHU8IrNhMXLe2KMZQ0/4H+k:cn9gldEeNSjJJ/4X/eNSjZJ/4bT9G4
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Download via BitsAdmin
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1