General

  • Target

    Client.exe

  • Size

    39KB

  • Sample

    241107-zx14ysxrbw

  • MD5

    2a0159c2f903f6f9b6fa99945b192390

  • SHA1

    c9097395a47d735ac81170a660150ae8619d808f

  • SHA256

    dcf58f42cfc14a42194c86488b96c8a3e40805af429098aa3df2a1d7c00a056a

  • SHA512

    00607739253604934f1db628297a303fcd49855c49fa990f4a4a92b28e5b4d15f4a6595b233a3ed34405947c804abfd31b9db82d853765848f2bc4122c74a301

  • SSDEEP

    768:UoDpCRKmug2wXiyuFR7/c2Caf6F9bcJ5/4D06chOOJi0W:UUUNXiyuX/cPafG9bO5/H6csO00W

Malware Config

Extracted

Family

xworm

Version

5.0

C2

23.ip.gl.ply.gg:51353

<Xwormmm>:1

Mutex

hJlsBGJd3N4Pi4wz

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

aes.plain

Targets

    • Target

      Client.exe

    • Size

      39KB

    • MD5

      2a0159c2f903f6f9b6fa99945b192390

    • SHA1

      c9097395a47d735ac81170a660150ae8619d808f

    • SHA256

      dcf58f42cfc14a42194c86488b96c8a3e40805af429098aa3df2a1d7c00a056a

    • SHA512

      00607739253604934f1db628297a303fcd49855c49fa990f4a4a92b28e5b4d15f4a6595b233a3ed34405947c804abfd31b9db82d853765848f2bc4122c74a301

    • SSDEEP

      768:UoDpCRKmug2wXiyuFR7/c2Caf6F9bcJ5/4D06chOOJi0W:UUUNXiyuX/cPafG9bO5/H6csO00W

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks