General

  • Target

    XClient.exe

  • Size

    39KB

  • Sample

    241103-xzyqhasalf

  • MD5

    26018b1cc33026362d9e0c234be46f09

  • SHA1

    54b4a4bbd362cb73bf8460060341d41bd5da7c7c

  • SHA256

    824b0ff9ae20df608469250c49ed475a55953215d41d65d69c972403c30bb3b5

  • SHA512

    bd00efbb6b036b0ee1e9c1355de7edc75813c08b8c3df5ddca2744e47cd32b05f2a217caf85ac0ff2dab236a907c78ea48ce2a892f6f38774f4dc3c77e944c7d

  • SSDEEP

    768:SkHHygWYC45lLJKuuwhSYypufFWPa9b/u6POwhfambD:DHHygW94VJKuuwhSjEFv9bm6POwVzP

Malware Config

Extracted

Family

xworm

Version

5.0

C2

147.185.221.19:2137

147.185.221.19:33365:2137

147.185.221.19:2137:2137

Mutex

rAejCyCNPpsrjmZq

Attributes
  • Install_directory

    %AppData%

  • install_file

    Wiindows Update.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      39KB

    • MD5

      26018b1cc33026362d9e0c234be46f09

    • SHA1

      54b4a4bbd362cb73bf8460060341d41bd5da7c7c

    • SHA256

      824b0ff9ae20df608469250c49ed475a55953215d41d65d69c972403c30bb3b5

    • SHA512

      bd00efbb6b036b0ee1e9c1355de7edc75813c08b8c3df5ddca2744e47cd32b05f2a217caf85ac0ff2dab236a907c78ea48ce2a892f6f38774f4dc3c77e944c7d

    • SSDEEP

      768:SkHHygWYC45lLJKuuwhSYypufFWPa9b/u6POwhfambD:DHHygW94VJKuuwhSjEFv9bm6POwVzP

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks