General
-
Target
XBinder.exe
-
Size
820KB
-
Sample
240818-2yptessgmm
-
MD5
90dcddcd355435afda38b6dad9ecd2fe
-
SHA1
2c2dda7074fe81c66567958a8c2d62cc48c49872
-
SHA256
bf2a1a92ffd7238e9eb0c77acae216562e3eb01fec35a324a45e3fcb503dde29
-
SHA512
6cf6237962f53322badd286991d3a5660691af0a8413a11e4200208830bc8c1a90da97c680d8808c97dd91ce33593f9774297089806a0bfea50531861735e249
-
SSDEEP
24576:9r/rjVJbC7vztZJIS002Kgp/nn6V9gDuBBYzu:57qx0ZnsiuLMu
Static task
static1
Behavioral task
behavioral1
Sample
XBinder.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
XBinder.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
XBinder.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
XBinder.exe
Resource
win11-20240802-en
Malware Config
Extracted
xworm
147.185.221.22:7992
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XBinder.exe
-
Size
820KB
-
MD5
90dcddcd355435afda38b6dad9ecd2fe
-
SHA1
2c2dda7074fe81c66567958a8c2d62cc48c49872
-
SHA256
bf2a1a92ffd7238e9eb0c77acae216562e3eb01fec35a324a45e3fcb503dde29
-
SHA512
6cf6237962f53322badd286991d3a5660691af0a8413a11e4200208830bc8c1a90da97c680d8808c97dd91ce33593f9774297089806a0bfea50531861735e249
-
SSDEEP
24576:9r/rjVJbC7vztZJIS002Kgp/nn6V9gDuBBYzu:57qx0ZnsiuLMu
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1