General

  • Target

    b472f0b933ca3b23811e2a0ee38ee7fe6b09160e0c3a44cac7a279558ab5abbaN

  • Size

    74KB

  • Sample

    241107-3svm6azhmn

  • MD5

    08a417a5e6e37956a220c44c99865c40

  • SHA1

    8b4adb379ca775611515c786649dbd8b53bf5023

  • SHA256

    b472f0b933ca3b23811e2a0ee38ee7fe6b09160e0c3a44cac7a279558ab5abba

  • SHA512

    1bd4db7b7b42a8beed9ae31f567382ea2f08f7bd375ef77972321a50d7bfbfe4ad6827a261ba0391519978e1b68385109d8b1c181c75b11791bd3858924fef92

  • SSDEEP

    1536:H3CAXGCBqu/gk03POhWoMFznFuM9FEpP4+bHgyOlCq3E6NfVO6X1yTv5Jxuit:XqCl02KziA+bAVZfVO6XQv/kK

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:42728

23.ip.gl.ply.gg:42728

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      b472f0b933ca3b23811e2a0ee38ee7fe6b09160e0c3a44cac7a279558ab5abbaN

    • Size

      74KB

    • MD5

      08a417a5e6e37956a220c44c99865c40

    • SHA1

      8b4adb379ca775611515c786649dbd8b53bf5023

    • SHA256

      b472f0b933ca3b23811e2a0ee38ee7fe6b09160e0c3a44cac7a279558ab5abba

    • SHA512

      1bd4db7b7b42a8beed9ae31f567382ea2f08f7bd375ef77972321a50d7bfbfe4ad6827a261ba0391519978e1b68385109d8b1c181c75b11791bd3858924fef92

    • SSDEEP

      1536:H3CAXGCBqu/gk03POhWoMFznFuM9FEpP4+bHgyOlCq3E6NfVO6X1yTv5Jxuit:XqCl02KziA+bAVZfVO6XQv/kK

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks