General

  • Target

    xclant.exe

  • Size

    70KB

  • Sample

    241119-c2fmgsyfpa

  • MD5

    be02e2396810bc407f7ada8d02c588c1

  • SHA1

    77c1f21128308f766fc4b359c48e63c146beca52

  • SHA256

    9271cc1d1de56861488f97a6c38b4175fda1d31992bf3349aad46f79c3d6f0a6

  • SHA512

    cefdd672a809016390157cd4ca9072284746e1082bfbc761f93da7b8c240244e981e739370787dfe1d9c45fce1a6bd9f990c65957411649beea2d908ecc4c907

  • SSDEEP

    1536:zOs8dJha3EWE70GlLsAo/j5b6ybuXjGs6X9mObkU83:zOBdXQlIxo75b6fXjW9mObkn3

Malware Config

Extracted

Family

xworm

C2

147.185.221.19:22298

Attributes
  • Install_directory

    %AppData%

  • install_file

    SystemUser32.exe

Targets

    • Target

      xclant.exe

    • Size

      70KB

    • MD5

      be02e2396810bc407f7ada8d02c588c1

    • SHA1

      77c1f21128308f766fc4b359c48e63c146beca52

    • SHA256

      9271cc1d1de56861488f97a6c38b4175fda1d31992bf3349aad46f79c3d6f0a6

    • SHA512

      cefdd672a809016390157cd4ca9072284746e1082bfbc761f93da7b8c240244e981e739370787dfe1d9c45fce1a6bd9f990c65957411649beea2d908ecc4c907

    • SSDEEP

      1536:zOs8dJha3EWE70GlLsAo/j5b6ybuXjGs6X9mObkU83:zOBdXQlIxo75b6fXjW9mObkn3

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks