General

  • Target

    XBinder.exe

  • Size

    820KB

  • Sample

    240818-2yptessgmm

  • MD5

    90dcddcd355435afda38b6dad9ecd2fe

  • SHA1

    2c2dda7074fe81c66567958a8c2d62cc48c49872

  • SHA256

    bf2a1a92ffd7238e9eb0c77acae216562e3eb01fec35a324a45e3fcb503dde29

  • SHA512

    6cf6237962f53322badd286991d3a5660691af0a8413a11e4200208830bc8c1a90da97c680d8808c97dd91ce33593f9774297089806a0bfea50531861735e249

  • SSDEEP

    24576:9r/rjVJbC7vztZJIS002Kgp/nn6V9gDuBBYzu:57qx0ZnsiuLMu

Malware Config

Extracted

Family

xworm

C2

147.185.221.22:7992

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      XBinder.exe

    • Size

      820KB

    • MD5

      90dcddcd355435afda38b6dad9ecd2fe

    • SHA1

      2c2dda7074fe81c66567958a8c2d62cc48c49872

    • SHA256

      bf2a1a92ffd7238e9eb0c77acae216562e3eb01fec35a324a45e3fcb503dde29

    • SHA512

      6cf6237962f53322badd286991d3a5660691af0a8413a11e4200208830bc8c1a90da97c680d8808c97dd91ce33593f9774297089806a0bfea50531861735e249

    • SSDEEP

      24576:9r/rjVJbC7vztZJIS002Kgp/nn6V9gDuBBYzu:57qx0ZnsiuLMu

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks