General

  • Target

    Xeno.exe

  • Size

    70KB

  • Sample

    241118-rkh4lstjdk

  • MD5

    1edee495fc92dcfdbfb89c0202f87b29

  • SHA1

    38d6c9154e066daa75d9a4f2346a1b7b7c84da2b

  • SHA256

    d87423760f97f5010d3589c0e7d5e704a698b4562b5d9de627b6d756a29cefe3

  • SHA512

    11709a00d0b5bb50b172344295c216f51a450d5e936fb15c5834a6a167d1ef75e1d510f94ff2105b87f41b1ff607843d4e365c056693e8b5a1d873bae013d1ac

  • SSDEEP

    1536:mvdK/frfAdNtG6zJllzZ+bPsag6Ha3OqY7l:LEXQM+bPsWa3Oqul

Malware Config

Extracted

Family

xworm

C2

20.ip.gl.ply.gg:53128

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

Targets

    • Target

      Xeno.exe

    • Size

      70KB

    • MD5

      1edee495fc92dcfdbfb89c0202f87b29

    • SHA1

      38d6c9154e066daa75d9a4f2346a1b7b7c84da2b

    • SHA256

      d87423760f97f5010d3589c0e7d5e704a698b4562b5d9de627b6d756a29cefe3

    • SHA512

      11709a00d0b5bb50b172344295c216f51a450d5e936fb15c5834a6a167d1ef75e1d510f94ff2105b87f41b1ff607843d4e365c056693e8b5a1d873bae013d1ac

    • SSDEEP

      1536:mvdK/frfAdNtG6zJllzZ+bPsag6Ha3OqY7l:LEXQM+bPsWa3Oqul

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks