General

  • Target

    XClient.exe

  • Size

    40KB

  • Sample

    241103-x5l9navlbm

  • MD5

    ad4a9bc7b627772f8cda8d736eb359a9

  • SHA1

    8d277f0b7ee2ec780fb90eddd0ef5c11f5346bc1

  • SHA256

    2b60a21a6c9404364d5cdfac590df4c5a5d9b45b2a9f84ad895ae8c7cab74585

  • SHA512

    eea576c5af88a860e436da57c39dd01d40d1e8d937aa7353e1ff131eeeff22731299898035c37abc2f72bdd407797340b994f84ce0e4c2110a982005cace5b78

  • SSDEEP

    768:ztvDRWjEry5lLJKuuwhSYypufFWPa9bZvf6POwhHambK:hvNWjQ2VJKuuwhSjEFv9bZvf6POw1zm

Malware Config

Extracted

Family

xworm

Version

5.0

C2

performance-ha.gl.at.ply.gg:33365:2137

performance-ha.gl.at.ply.gg:2137

performance-ha.gl.at.ply.gg:2137:2137

127.0.0.1:2137:2137

147.185.221.19:2137

147.185.221.19:2137:2137

147.185.221.19:33365:2137

Mutex

pV2sMK72YBFm09Q1

Attributes
  • Install_directory

    %AppData%

  • install_file

    Wiindows Update.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      40KB

    • MD5

      ad4a9bc7b627772f8cda8d736eb359a9

    • SHA1

      8d277f0b7ee2ec780fb90eddd0ef5c11f5346bc1

    • SHA256

      2b60a21a6c9404364d5cdfac590df4c5a5d9b45b2a9f84ad895ae8c7cab74585

    • SHA512

      eea576c5af88a860e436da57c39dd01d40d1e8d937aa7353e1ff131eeeff22731299898035c37abc2f72bdd407797340b994f84ce0e4c2110a982005cace5b78

    • SSDEEP

      768:ztvDRWjEry5lLJKuuwhSYypufFWPa9bZvf6POwhHambK:hvNWjQ2VJKuuwhSjEFv9bZvf6POw1zm

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks