General

  • Target

    XBinderOutput.exe

  • Size

    5.2MB

  • Sample

    241113-11cq7stmbk

  • MD5

    dfc4fe438bf0f48fc9a6e1abe5391962

  • SHA1

    f25de3b3c2455cf674cd90ab2c87587177db6ed4

  • SHA256

    f43feac8d598b74de66b04aaac9fc1c1fe40784295ef75a3e050fe81cb24cc8c

  • SHA512

    6ad48e7f3ba3130390f584b3e8e7538f20f40334583557cbfcec57b0fc257ac63b68e2f33e3efb83d6638545175a43e9ebcdaacef3ba6fd9fbb11e8bda24a1ca

  • SSDEEP

    98304:IpmJAGbcS0n4NnZg+O4KDKctCLX5LdyTUzhYybcHsXIJZGUS2V:/AjagIqKct45OdMEdJZG3s

Malware Config

Extracted

Family

xworm

C2

man-laughing.gl.at.ply.gg:57783

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    Windows Data Compiler.exe

Targets

    • Target

      XBinderOutput.exe

    • Size

      5.2MB

    • MD5

      dfc4fe438bf0f48fc9a6e1abe5391962

    • SHA1

      f25de3b3c2455cf674cd90ab2c87587177db6ed4

    • SHA256

      f43feac8d598b74de66b04aaac9fc1c1fe40784295ef75a3e050fe81cb24cc8c

    • SHA512

      6ad48e7f3ba3130390f584b3e8e7538f20f40334583557cbfcec57b0fc257ac63b68e2f33e3efb83d6638545175a43e9ebcdaacef3ba6fd9fbb11e8bda24a1ca

    • SSDEEP

      98304:IpmJAGbcS0n4NnZg+O4KDKctCLX5LdyTUzhYybcHsXIJZGUS2V:/AjagIqKct45OdMEdJZG3s

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks