General

  • Target

    CMDBITX_Crack__By_Rank1_Fix1.exe

  • Size

    5.7MB

  • Sample

    241102-l62vystkhp

  • MD5

    f5ca75b6deed282fb277bcd87dcf968d

  • SHA1

    de0aafbc767308332795f0de7d59e30f1f1293fa

  • SHA256

    cbc725af77ebf25c61784ad3df87a4d42003492931562c3d6ca00c0726320f98

  • SHA512

    bffbe2cf79dfd4efdb760d3bb440f2ebbee7a1db6c4b6f87e19407efa597927f35766dfb23300890ce0f2c33e2f178c25423d6cd6bd3d1500574efd72e365f57

  • SSDEEP

    98304:ezg8NHE04004RmgZKJG4HrC5rji6tXtNhUc9u70rhwt3FNHbJ5gJYNIi56LKAsYv:ezvdh40lRmwuG4Glt1Uy/t0Xb5NIiIAK

Malware Config

Extracted

Family

xworm

C2

85.203.4.149:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    XClient.exe

Targets

    • Target

      CMDBITX_Crack__By_Rank1_Fix1.exe

    • Size

      5.7MB

    • MD5

      f5ca75b6deed282fb277bcd87dcf968d

    • SHA1

      de0aafbc767308332795f0de7d59e30f1f1293fa

    • SHA256

      cbc725af77ebf25c61784ad3df87a4d42003492931562c3d6ca00c0726320f98

    • SHA512

      bffbe2cf79dfd4efdb760d3bb440f2ebbee7a1db6c4b6f87e19407efa597927f35766dfb23300890ce0f2c33e2f178c25423d6cd6bd3d1500574efd72e365f57

    • SSDEEP

      98304:ezg8NHE04004RmgZKJG4HrC5rji6tXtNhUc9u70rhwt3FNHbJ5gJYNIi56LKAsYv:ezvdh40lRmwuG4Glt1Uy/t0Xb5NIiIAK

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks