General

  • Target

    XClient.exe

  • Size

    83KB

  • Sample

    241118-sce8estpbm

  • MD5

    a553d650efef4d852fb707270a57f6b8

  • SHA1

    80dfd72248fc1522b1f6cacf24b4258865e5bce4

  • SHA256

    4d87eb4b63dee3832f8a94445e8d5b7c8f1d5335650d0fab2b6bfdc3d6b591d2

  • SHA512

    6132fb8204e6a4fff10f9788abb63840f0d34f752f0c28aa9c49a21c38ffa14a6aa0b8bcdfad887e84aa24297dcbdacf46608ad0eada859b85cab95b4cadfd46

  • SSDEEP

    1536:xSteEftgm7/FDdQv78wWbG3NycZ8TufTa3sQwYPo62+2ONvNIAsF:3OldgAdbG3NV6gSqONvN8F

Malware Config

Extracted

Family

xworm

C2

another-limits.gl.at.ply.gg:63201

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    $77wsappx.exe

Targets

    • Target

      XClient.exe

    • Size

      83KB

    • MD5

      a553d650efef4d852fb707270a57f6b8

    • SHA1

      80dfd72248fc1522b1f6cacf24b4258865e5bce4

    • SHA256

      4d87eb4b63dee3832f8a94445e8d5b7c8f1d5335650d0fab2b6bfdc3d6b591d2

    • SHA512

      6132fb8204e6a4fff10f9788abb63840f0d34f752f0c28aa9c49a21c38ffa14a6aa0b8bcdfad887e84aa24297dcbdacf46608ad0eada859b85cab95b4cadfd46

    • SSDEEP

      1536:xSteEftgm7/FDdQv78wWbG3NycZ8TufTa3sQwYPo62+2ONvNIAsF:3OldgAdbG3NV6gSqONvN8F

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks