General

  • Target

    XClient.exe

  • Size

    71KB

  • Sample

    241117-yyx81sxene

  • MD5

    4eee730e3f4cd1e6b1f2455dbf51f5b7

  • SHA1

    c95911de37debd2e3df1c630ddeeac4968413296

  • SHA256

    5e0fbebfe54253ec36ca1b69bb380e2568de6fb650185438068b77212ad6d23e

  • SHA512

    7caf0d07acc752c16c29d77c4ae0c67163367435ec7fe6109ed1561f4c2320c9a54449e911d48d627606c822108fbe48b4193201adee5137015837359e1768f4

  • SSDEEP

    1536:eV/fyQp7uAxurpTNgbRaKgjtqK6B64iS5O2x571t:eV/d7hot2bYDDlS5O2x3t

Malware Config

Extracted

Family

xworm

C2

147.185.221.23:38042

Attributes
  • Install_directory

    %AppData%

  • install_file

    SystemUser32.exe

Targets

    • Target

      XClient.exe

    • Size

      71KB

    • MD5

      4eee730e3f4cd1e6b1f2455dbf51f5b7

    • SHA1

      c95911de37debd2e3df1c630ddeeac4968413296

    • SHA256

      5e0fbebfe54253ec36ca1b69bb380e2568de6fb650185438068b77212ad6d23e

    • SHA512

      7caf0d07acc752c16c29d77c4ae0c67163367435ec7fe6109ed1561f4c2320c9a54449e911d48d627606c822108fbe48b4193201adee5137015837359e1768f4

    • SSDEEP

      1536:eV/fyQp7uAxurpTNgbRaKgjtqK6B64iS5O2x571t:eV/d7hot2bYDDlS5O2x3t

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks