General

  • Target

    XClient.exe

  • Size

    43KB

  • Sample

    241110-b2ejrawkfw

  • MD5

    7e71f66eb4bd975fa6894f7be63d9de7

  • SHA1

    a0b6a69adffde7a5209498ce1656f0d406da9204

  • SHA256

    89055b8db329f28180bdd72d02227f175a46b79b470c5131e932d235104ab6e1

  • SHA512

    5a776de6708ffa802700febe9a6a1cd95cd907f8d435c7ea28644c3c31565e373223b8db05ca142cb5bdc0d13745fba03099edbfc2fe7f9095232a997cdf6bf1

  • SSDEEP

    768:vSniTSIuNNk3MO56kjBbvSevz5zbbTf8EmZPcBH6clOQhAGb:oiT9n6k5zbHf8PZP8H6OOQC8

Malware Config

Extracted

Family

xworm

Version

3.1

C2

147.185.221.23:53631

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      XClient.exe

    • Size

      43KB

    • MD5

      7e71f66eb4bd975fa6894f7be63d9de7

    • SHA1

      a0b6a69adffde7a5209498ce1656f0d406da9204

    • SHA256

      89055b8db329f28180bdd72d02227f175a46b79b470c5131e932d235104ab6e1

    • SHA512

      5a776de6708ffa802700febe9a6a1cd95cd907f8d435c7ea28644c3c31565e373223b8db05ca142cb5bdc0d13745fba03099edbfc2fe7f9095232a997cdf6bf1

    • SSDEEP

      768:vSniTSIuNNk3MO56kjBbvSevz5zbbTf8EmZPcBH6clOQhAGb:oiT9n6k5zbHf8PZP8H6OOQC8

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • UAC bypass

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks