General

  • Target

    TRXLoader.exe

  • Size

    44.0MB

  • Sample

    241111-n4t4fayjds

  • MD5

    a4b651742b17fcb894107862b5587344

  • SHA1

    9fb0be5290ff4cb8a7e7a41656beb950f7718f8d

  • SHA256

    3f862630ab1f165e33bdf388a4829a0274abd88ee783273f03353857c21aa9a0

  • SHA512

    ba19d8bc1aa69553f1ea1ab3937e226b4664be81fa77371d093a52f23a9806e7f7e9f3f11dbec805b7ed943cb571984774c5591dbedf816c7ff05aaf7da062b3

  • SSDEEP

    1536:j3eHtRfrimdNmkKZr311OGAiQj39IdcCqcAPt9TeKd+k:KHtRp6r311RAzj390VAPt9P+k

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:38492

warning-ms.gl.at.ply.gg:38492

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      TRXLoader.exe

    • Size

      44.0MB

    • MD5

      a4b651742b17fcb894107862b5587344

    • SHA1

      9fb0be5290ff4cb8a7e7a41656beb950f7718f8d

    • SHA256

      3f862630ab1f165e33bdf388a4829a0274abd88ee783273f03353857c21aa9a0

    • SHA512

      ba19d8bc1aa69553f1ea1ab3937e226b4664be81fa77371d093a52f23a9806e7f7e9f3f11dbec805b7ed943cb571984774c5591dbedf816c7ff05aaf7da062b3

    • SSDEEP

      1536:j3eHtRfrimdNmkKZr311OGAiQj39IdcCqcAPt9TeKd+k:KHtRp6r311RAzj390VAPt9P+k

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks