General

  • Target

    XClientnigaz.exe

  • Size

    79KB

  • Sample

    241112-d2vl3sxjhq

  • MD5

    8fb3eace3e1ba795ccc5a82b911503cb

  • SHA1

    8566285c99b8fda42b3d68495dac3377d6231401

  • SHA256

    8c8a2fea63dc99d033af66a6cbc0034ed3eafbf20912e58f8d571555584154da

  • SHA512

    240a7ed95bfebb9472dfee2d2eab49db245d5fde37d4b9585316ef3cc0762008a17a7863506ee94a1ecb469e42ee01ec84080070edf50ab5ae6702923cac3938

  • SSDEEP

    1536:Oui+59ku1fCyjvid5oXsK+bTlexkHV/6+bOIgY4OOsGN:Yju1fhjvi/Q+bTl/bOFYON

Malware Config

Extracted

Family

xworm

C2

195.88.218.113:30101

Attributes
  • Install_directory

    %AppData%

  • install_file

    Console Window Host.exe

Targets

    • Target

      XClientnigaz.exe

    • Size

      79KB

    • MD5

      8fb3eace3e1ba795ccc5a82b911503cb

    • SHA1

      8566285c99b8fda42b3d68495dac3377d6231401

    • SHA256

      8c8a2fea63dc99d033af66a6cbc0034ed3eafbf20912e58f8d571555584154da

    • SHA512

      240a7ed95bfebb9472dfee2d2eab49db245d5fde37d4b9585316ef3cc0762008a17a7863506ee94a1ecb469e42ee01ec84080070edf50ab5ae6702923cac3938

    • SSDEEP

      1536:Oui+59ku1fCyjvid5oXsK+bTlexkHV/6+bOIgY4OOsGN:Yju1fhjvi/Q+bTl/bOFYON

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks