General

  • Target

    XClient.exe

  • Size

    72KB

  • Sample

    240806-hebmxawdjg

  • MD5

    6c46aec5e230a3c015e723371e9ed545

  • SHA1

    b9b99ef294fe844c7ccf60f238884e0d1f7b95e9

  • SHA256

    89996b25806787faccddda80c978f654d472e8b83add9f952cbd06584817d498

  • SHA512

    ebc3d9fecb922e1a6c68cc1fd0de79bd8a1aa1781a380f5e2273bd3977efb72c65bf8b62a3f4b8c931b30fdb112060bf1db7a4979a8acfbf10743d0950ea8769

  • SSDEEP

    1536:ennaej+cU2HD7hF7bdocpcdace65ez2ODhndpLPwa:KnaslFjbdoKo97OXhoa

Malware Config

Extracted

Family

xworm

C2

printer-visa.gl.at.ply.gg:35374

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      XClient.exe

    • Size

      72KB

    • MD5

      6c46aec5e230a3c015e723371e9ed545

    • SHA1

      b9b99ef294fe844c7ccf60f238884e0d1f7b95e9

    • SHA256

      89996b25806787faccddda80c978f654d472e8b83add9f952cbd06584817d498

    • SHA512

      ebc3d9fecb922e1a6c68cc1fd0de79bd8a1aa1781a380f5e2273bd3977efb72c65bf8b62a3f4b8c931b30fdb112060bf1db7a4979a8acfbf10743d0950ea8769

    • SSDEEP

      1536:ennaej+cU2HD7hF7bdocpcdace65ez2ODhndpLPwa:KnaslFjbdoKo97OXhoa

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks