General

  • Target

    XClient.exe

  • Size

    77KB

  • Sample

    240816-z679ma1err

  • MD5

    7273e7398abffebe1a6e5fa1f1fa7c83

  • SHA1

    b67932dedeb79eaa045c00c4d99284c07471f128

  • SHA256

    5db745310566f7afb62ac78799ed82fe53b9c533375f2147776a09e0c9282f1c

  • SHA512

    f0a266644ff669ed4cc2c1dcccb29194aa54f1a73b30aa3c1cd6736a8b38b6a206dbbef46dd815f8332798790c53db5a74543c3961705e25b7fd745938335e35

  • SSDEEP

    1536:dah6bZfFTE8TAHdibNWQva/yj6ywdVjECObddKEhZ:Mh6bZtOsbNLS/Owd1ECObddKsZ

Malware Config

Extracted

Family

xworm

C2

192.168.1.10:7000

Attributes
  • Install_directory

    %Temp%

  • install_file

    XClient.exe

Targets

    • Target

      XClient.exe

    • Size

      77KB

    • MD5

      7273e7398abffebe1a6e5fa1f1fa7c83

    • SHA1

      b67932dedeb79eaa045c00c4d99284c07471f128

    • SHA256

      5db745310566f7afb62ac78799ed82fe53b9c533375f2147776a09e0c9282f1c

    • SHA512

      f0a266644ff669ed4cc2c1dcccb29194aa54f1a73b30aa3c1cd6736a8b38b6a206dbbef46dd815f8332798790c53db5a74543c3961705e25b7fd745938335e35

    • SSDEEP

      1536:dah6bZfFTE8TAHdibNWQva/yj6ywdVjECObddKEhZ:Mh6bZtOsbNLS/Owd1ECObddKsZ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks