General

  • Target

    XbinderV2.1.exe

  • Size

    5.0MB

  • Sample

    241119-2kefjavejj

  • MD5

    4fae9d58f316945e4dd804b87ea448ea

  • SHA1

    2040e113ff666ff86b4c6bbe0ad8ffb90b8b08b9

  • SHA256

    fcde1964bf5a6864ae27f37f2275d72177414c1cc0c7a335b9016df530ca8861

  • SHA512

    609b7cd7e4baf006ddbff99e44d6724e009938bccc1ae332417abe21c0de1001275c54e33c9d18d6de751bcaa4e4f2482877368116564d0f6dca83f4ef16d3c7

  • SSDEEP

    24576:yair/rjVJbC7vztZJIS002Kgp/nn6V9g:ya07qx0Zns

Malware Config

Extracted

Family

xworm

C2

193.161.193.99:63603

37.4.250.236:63603

Attributes
  • Install_directory

    %AppData%

  • install_file

    Runtime.exe

Targets

    • Target

      XbinderV2.1.exe

    • Size

      5.0MB

    • MD5

      4fae9d58f316945e4dd804b87ea448ea

    • SHA1

      2040e113ff666ff86b4c6bbe0ad8ffb90b8b08b9

    • SHA256

      fcde1964bf5a6864ae27f37f2275d72177414c1cc0c7a335b9016df530ca8861

    • SHA512

      609b7cd7e4baf006ddbff99e44d6724e009938bccc1ae332417abe21c0de1001275c54e33c9d18d6de751bcaa4e4f2482877368116564d0f6dca83f4ef16d3c7

    • SSDEEP

      24576:yair/rjVJbC7vztZJIS002Kgp/nn6V9g:ya07qx0Zns

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks