General

  • Target

    XClient.exe

  • Size

    41KB

  • Sample

    241120-t7tjzazkcv

  • MD5

    f39bdd2e04dd6485c35843cfb7ed5328

  • SHA1

    12613c804847302eaf51d248125bf567d6e0fc81

  • SHA256

    739dcb8887532e966ae7e49e95de28b9f89e342d5ac8ab4a6fc66163a6ec656a

  • SHA512

    ff0ab2cab30d784c429f614915d6e90623ba4e07952052263d3d64abe5b19a462f0dbfee57c13a19f258828bf0a18011f5e8154f0cc655275303a186114d8664

  • SSDEEP

    768:myIOKKVKWC6+3XvgggCLJF5PG9pm96vOwhv3Emz/:mzbKVKWLoXvvgcFI9A96vOwN9z

Malware Config

Extracted

Family

xworm

Version

5.0

C2

tcp://ikonik2681-35277.portmap.host:35277

Mutex

vlO7QJJcLCTXEz3h

Attributes
  • Install_directory

    %AppData%

  • install_file

    $77MicrosoftDefender.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      41KB

    • MD5

      f39bdd2e04dd6485c35843cfb7ed5328

    • SHA1

      12613c804847302eaf51d248125bf567d6e0fc81

    • SHA256

      739dcb8887532e966ae7e49e95de28b9f89e342d5ac8ab4a6fc66163a6ec656a

    • SHA512

      ff0ab2cab30d784c429f614915d6e90623ba4e07952052263d3d64abe5b19a462f0dbfee57c13a19f258828bf0a18011f5e8154f0cc655275303a186114d8664

    • SSDEEP

      768:myIOKKVKWC6+3XvgggCLJF5PG9pm96vOwhv3Emz/:mzbKVKWLoXvvgcFI9A96vOwN9z

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks