General

  • Target

    XwormV5.6.exe

  • Size

    15.0MB

  • Sample

    241117-mll5faxhlh

  • MD5

    2ff4c5a7eff1d9f19e23156dceeca4d0

  • SHA1

    d8c175bb2b968713d48b37e1d018c8736a34ea6d

  • SHA256

    198f82a2b491cb5c769d25c03ea7908161e20a9b51b585099f7088cef5c4323e

  • SHA512

    2c839576c2a9ce47b4d37325417a4055e4f8674323b6b1a558fac35628eaf32e354271936ceb8dc6a38ccc24b170cc17c08e74a994e8363831b410810d676a05

  • SSDEEP

    3072:LJKhDbtkb2D7wyOQnxZd+xYoPdLa5a47Qnx5RUUOMlv1s8W:LJKhDSbFGExYoPJatsjtlv1s8

Malware Config

Extracted

Family

xworm

C2

193.161.193.99:63603

37.4.250.173:63603

Attributes
  • Install_directory

    %AppData%

  • install_file

    XwormV6.exe

Targets

    • Target

      XwormV5.6.exe

    • Size

      15.0MB

    • MD5

      2ff4c5a7eff1d9f19e23156dceeca4d0

    • SHA1

      d8c175bb2b968713d48b37e1d018c8736a34ea6d

    • SHA256

      198f82a2b491cb5c769d25c03ea7908161e20a9b51b585099f7088cef5c4323e

    • SHA512

      2c839576c2a9ce47b4d37325417a4055e4f8674323b6b1a558fac35628eaf32e354271936ceb8dc6a38ccc24b170cc17c08e74a994e8363831b410810d676a05

    • SSDEEP

      3072:LJKhDbtkb2D7wyOQnxZd+xYoPdLa5a47Qnx5RUUOMlv1s8W:LJKhDSbFGExYoPJatsjtlv1s8

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks