General

  • Target

    XClient.exe

  • Size

    59KB

  • Sample

    240819-r6948azfrg

  • MD5

    36da0633a83eea45035eb69f0679c9be

  • SHA1

    3ee638634881bdb3621e24e7c528ecb88c831887

  • SHA256

    11ebc3db802d0d3f6291f4d7bc416176b934b4d3d331603a97032cadf87f8ce3

  • SHA512

    62c148cf4da3a825bdf907753446d03ed6a769b52e0cc622f4ac4b95d895c6b7af0da7dd4d35e883cc7188b261fc84bc9ec0198b0faa5b545ba9ae9d89a9b3cf

  • SSDEEP

    1536:KCLX6vMXXKD1Gq65PFkbP0sFzi86nzE9OLm7:KCj60k1GtFkbPJzS2OLm7

Malware Config

Extracted

Family

xworm

C2

ii-rebate.gl.at.ply.gg:62928

Attributes
  • Install_directory

    %Temp%

Targets

    • Target

      XClient.exe

    • Size

      59KB

    • MD5

      36da0633a83eea45035eb69f0679c9be

    • SHA1

      3ee638634881bdb3621e24e7c528ecb88c831887

    • SHA256

      11ebc3db802d0d3f6291f4d7bc416176b934b4d3d331603a97032cadf87f8ce3

    • SHA512

      62c148cf4da3a825bdf907753446d03ed6a769b52e0cc622f4ac4b95d895c6b7af0da7dd4d35e883cc7188b261fc84bc9ec0198b0faa5b545ba9ae9d89a9b3cf

    • SSDEEP

      1536:KCLX6vMXXKD1Gq65PFkbP0sFzi86nzE9OLm7:KCj60k1GtFkbPJzS2OLm7

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks