General

  • Target

    20b9dd6d08f23de84f317c3a1e270a8f952778d7a477b661fb820e078adbe07e.exe

  • Size

    42KB

  • Sample

    241113-qetsgs1rgt

  • MD5

    b1c9c7a5e1f914ce0094aa08046015dc

  • SHA1

    31299c6babfb89124cd60169e7429dc9566af8dd

  • SHA256

    20b9dd6d08f23de84f317c3a1e270a8f952778d7a477b661fb820e078adbe07e

  • SHA512

    3c287c3ea393cab841ee91f715d1cb6bac0c762eb7fa9a1bea838ac02e65a7beb929e3fe5b7c0d7c3312177fc589085496900c6e2aa68372ecba38573f5feed5

  • SSDEEP

    768:EqpDpHTSWG3J9E/B0oZ4XVGCqF3t9bd6UOChvIPkV:E+DV+BI/2oZ4XV4F99bd6UOClGkV

Malware Config

Extracted

Family

xworm

Version

5.0

C2

gay-nursery.gl.at.ply.gg:51408

Mutex

v9Zf3WMcQnnzzZmX

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      20b9dd6d08f23de84f317c3a1e270a8f952778d7a477b661fb820e078adbe07e.exe

    • Size

      42KB

    • MD5

      b1c9c7a5e1f914ce0094aa08046015dc

    • SHA1

      31299c6babfb89124cd60169e7429dc9566af8dd

    • SHA256

      20b9dd6d08f23de84f317c3a1e270a8f952778d7a477b661fb820e078adbe07e

    • SHA512

      3c287c3ea393cab841ee91f715d1cb6bac0c762eb7fa9a1bea838ac02e65a7beb929e3fe5b7c0d7c3312177fc589085496900c6e2aa68372ecba38573f5feed5

    • SSDEEP

      768:EqpDpHTSWG3J9E/B0oZ4XVGCqF3t9bd6UOChvIPkV:E+DV+BI/2oZ4XV4F99bd6UOClGkV

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks