General

  • Target

    222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe

  • Size

    205KB

  • Sample

    240914-bkxn1aygnr

  • MD5

    f66d550297b5c67560fcdfef40b9bf5e

  • SHA1

    9ea877d3063ed6f9f381b74e0fc71b9e72b52929

  • SHA256

    222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6

  • SHA512

    8247e3a890163c6fddec7dc8bfb420c51cfa6aa5863203f733ad34b611f598c92d6e9405af64ade3fe8149dca55c1504071677b7dbd3c5b57f19a61f43f0ab0d

  • SSDEEP

    3072:ff05a/CTR9hFc9UxOMh8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLnF:WR9Hc9wUhcX7elbKTuq9bfF/H9d9n

Malware Config

Extracted

Family

xworm

Version

5.0

C2

147.50.240.203:7000

Mutex

X0ZQBFW2mJiaVxWi

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe

    • Size

      205KB

    • MD5

      f66d550297b5c67560fcdfef40b9bf5e

    • SHA1

      9ea877d3063ed6f9f381b74e0fc71b9e72b52929

    • SHA256

      222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6

    • SHA512

      8247e3a890163c6fddec7dc8bfb420c51cfa6aa5863203f733ad34b611f598c92d6e9405af64ade3fe8149dca55c1504071677b7dbd3c5b57f19a61f43f0ab0d

    • SSDEEP

      3072:ff05a/CTR9hFc9UxOMh8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLnF:WR9Hc9wUhcX7elbKTuq9bfF/H9d9n

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks