General

  • Target

    c9d4b9b3751784bbe0098478aebd2a0f072ac994671b75702503efc69906fd35N.exe

  • Size

    42KB

  • Sample

    241113-n2zadavkgr

  • MD5

    17d3a3e60c84b126ca2c72b1a2a88100

  • SHA1

    5210737c8f6a1cf818ea1868a63c8009780632db

  • SHA256

    c9d4b9b3751784bbe0098478aebd2a0f072ac994671b75702503efc69906fd35

  • SHA512

    8e1ed27c5f72951e76875b8312fbdf65929d2e0f3158f9c1156d9a05b339456aa6654deb74718abb7a6f8c92b647168c0465dcca163cb944c7c81ca79ec32ec7

  • SSDEEP

    768:EqpDpHTSWG3J9E/B0oZ4XVGCqF3t9bd6UOChvIPk:E+DV+BI/2oZ4XV4F99bd6UOClGk

Malware Config

Extracted

Family

xworm

Version

5.0

C2

gay-nursery.gl.at.ply.gg:51408

Mutex

v9Zf3WMcQnnzzZmX

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      c9d4b9b3751784bbe0098478aebd2a0f072ac994671b75702503efc69906fd35N.exe

    • Size

      42KB

    • MD5

      17d3a3e60c84b126ca2c72b1a2a88100

    • SHA1

      5210737c8f6a1cf818ea1868a63c8009780632db

    • SHA256

      c9d4b9b3751784bbe0098478aebd2a0f072ac994671b75702503efc69906fd35

    • SHA512

      8e1ed27c5f72951e76875b8312fbdf65929d2e0f3158f9c1156d9a05b339456aa6654deb74718abb7a6f8c92b647168c0465dcca163cb944c7c81ca79ec32ec7

    • SSDEEP

      768:EqpDpHTSWG3J9E/B0oZ4XVGCqF3t9bd6UOChvIPk:E+DV+BI/2oZ4XV4F99bd6UOClGk

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks