General

  • Target

    XCliet.exe

  • Size

    68KB

  • Sample

    241106-y4wx5swnaz

  • MD5

    0815ae69147a697b5bae3d8d15cb7c75

  • SHA1

    99a3b145ca36742aa0cbe0ef33829426f1dcf4ef

  • SHA256

    4e986640769f16346bc1b6d9f5d033f4452c659b1275fc70bc736f1b2079828a

  • SHA512

    992b165f6816f4711b3b0a6b7a8f83e4f58838abea7714df4bc8c30f7d9ed401d9b8f63296e3d13ca2d81894f754511628b042c5028feca4f54ca2b6bf70f0aa

  • SSDEEP

    1536:RR1SVHku2BbeHCKNNJu+b4+QA6e2OcJv5SuUA:oReSTNu+b4e2Oa7R

Malware Config

Extracted

Family

xworm

C2

pst-evidence.gl.at.ply.gg:8848

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    System32.exe

Targets

    • Target

      XCliet.exe

    • Size

      68KB

    • MD5

      0815ae69147a697b5bae3d8d15cb7c75

    • SHA1

      99a3b145ca36742aa0cbe0ef33829426f1dcf4ef

    • SHA256

      4e986640769f16346bc1b6d9f5d033f4452c659b1275fc70bc736f1b2079828a

    • SHA512

      992b165f6816f4711b3b0a6b7a8f83e4f58838abea7714df4bc8c30f7d9ed401d9b8f63296e3d13ca2d81894f754511628b042c5028feca4f54ca2b6bf70f0aa

    • SSDEEP

      1536:RR1SVHku2BbeHCKNNJu+b4+QA6e2OcJv5SuUA:oReSTNu+b4e2Oa7R

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks