Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    XClient.exe

  • Size

    69KB

  • Sample

    240901-l25q2sxerm

  • MD5

    7fa99ccbea8ecaf80ed87ebdb44c17dd

  • SHA1

    e2f29018810fbf56a5e475a187d749f3adbbc0a7

  • SHA256

    48d709a89f1ede2666185789ae0747f90139d7d46687d05cb6d17e45a3fea965

  • SHA512

    39165c4fc25403823d124e43022ca8fa78e643204885024ff9c0f96b9d3f021ec44287f5080b7115e68e8c254627660512d2430e4e68bbe6b778607e7f4a9d83

  • SSDEEP

    1536:yc52LJ8cdIA01NxTZ6BYjmzJibJ+bQzAxAS91mb6uLO1X5g:d5WJpb0NTABXzk+bQzE+LO1Xu

Malware Config

Extracted

Family

xworm

C2

brands-colors.gl.at.ply.gg:28379

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    svchost.exe

Targets

    • Target

      XClient.exe

    • Size

      69KB

    • MD5

      7fa99ccbea8ecaf80ed87ebdb44c17dd

    • SHA1

      e2f29018810fbf56a5e475a187d749f3adbbc0a7

    • SHA256

      48d709a89f1ede2666185789ae0747f90139d7d46687d05cb6d17e45a3fea965

    • SHA512

      39165c4fc25403823d124e43022ca8fa78e643204885024ff9c0f96b9d3f021ec44287f5080b7115e68e8c254627660512d2430e4e68bbe6b778607e7f4a9d83

    • SSDEEP

      1536:yc52LJ8cdIA01NxTZ6BYjmzJibJ+bQzAxAS91mb6uLO1X5g:d5WJpb0NTABXzk+bQzE+LO1Xu

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • XenArmor Suite

      XenArmor is as suite of password recovery tools for various application.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.