General

  • Target

    XWorm V5.2.rar

  • Size

    44.4MB

  • Sample

    240905-ylx3gsybkp

  • MD5

    b115aa5c5af0ddab4716050ee9c8d4dd

  • SHA1

    20acaa72078e1cadf68c93b0625fac451d611bdb

  • SHA256

    84d6e79b5ffbb177430dd3848a4a1569dbd1d2748357ba5d664d763c4d6af3cf

  • SHA512

    6d710efc7199eefac0fc47b4400bb3c7fbc7836aa2fb5857e2ad93d50f77926a58c37b9ed3a25aec98cfc4f2bf35e6c623c25aa86acd528a8295db1fc1f317ee

  • SSDEEP

    786432:FIYpoVAaEEMtnoP08tWbbUy3S1AMkAblO2v9HYvo2OkQDZ9VZP6lMowO8zohq:6hVAaEdA8bK1ADoX9qo2gDJZPQN8z5

Malware Config

Extracted

Family

xworm

C2

18.ip.gl.ply.gg:13256

18.ip.gl.ply.gg:6782

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • pastebin_url

    https://pastebin.com/raw/EkPd4scK

Targets

    • Target

      XWorm V5.2.rar

    • Size

      44.4MB

    • MD5

      b115aa5c5af0ddab4716050ee9c8d4dd

    • SHA1

      20acaa72078e1cadf68c93b0625fac451d611bdb

    • SHA256

      84d6e79b5ffbb177430dd3848a4a1569dbd1d2748357ba5d664d763c4d6af3cf

    • SHA512

      6d710efc7199eefac0fc47b4400bb3c7fbc7836aa2fb5857e2ad93d50f77926a58c37b9ed3a25aec98cfc4f2bf35e6c623c25aa86acd528a8295db1fc1f317ee

    • SSDEEP

      786432:FIYpoVAaEEMtnoP08tWbbUy3S1AMkAblO2v9HYvo2OkQDZ9VZP6lMowO8zohq:6hVAaEdA8bK1ADoX9qo2gDJZPQN8z5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • AgentTesla payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks