General

  • Target

    BITXGOD_Crack_Rank1_Fix1.exe

  • Size

    7.9MB

  • Sample

    241102-mem36azrfx

  • MD5

    f6e77b8c7939a65dd8ff319c67298aac

  • SHA1

    467aa64fc82ec6628461c7f2d763a862de336346

  • SHA256

    e03e0c1d95dbafd94c174b191e42d946b8325b5a3bacf840ffbe95ae6608bf03

  • SHA512

    0e81858a6215736960b61022017bf65829652fe3875c88a1762136f14789f4c9fbe07e075fb75238c29c23d0982bd28e20f7dd056b6b8068b307966211527d1f

  • SSDEEP

    196608:sXiMd8bcxr/tkK9WshVu2xZ3FyrkZYqiET8X:sZd8Or/mKp7u2LcwZYqiN

Malware Config

Extracted

Family

xworm

C2

85.203.4.149:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    XClient.exe

Targets

    • Target

      BITXGOD_Crack_Rank1_Fix1.exe

    • Size

      7.9MB

    • MD5

      f6e77b8c7939a65dd8ff319c67298aac

    • SHA1

      467aa64fc82ec6628461c7f2d763a862de336346

    • SHA256

      e03e0c1d95dbafd94c174b191e42d946b8325b5a3bacf840ffbe95ae6608bf03

    • SHA512

      0e81858a6215736960b61022017bf65829652fe3875c88a1762136f14789f4c9fbe07e075fb75238c29c23d0982bd28e20f7dd056b6b8068b307966211527d1f

    • SSDEEP

      196608:sXiMd8bcxr/tkK9WshVu2xZ3FyrkZYqiET8X:sZd8Or/mKp7u2LcwZYqiN

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks