General

  • Target

    extfix.exe

  • Size

    75KB

  • Sample

    241120-ybgbzs1fmd

  • MD5

    03ac7cea640de499ffd4d820cbf91aec

  • SHA1

    c5431178ad49172a65398770a03fecccc37f711f

  • SHA256

    c6ac39bb6bd04c72e7c1f23b6d98b7a3ae591efa9ef285458b27bef353a255cb

  • SHA512

    52186a0938de15b83873626f72f594219dc193b1d5b7fbec5d2577761488f3379d5cd42e6de205964f6dec5cdfc3023de36375da28a0146a5311ab0516f23d7c

  • SSDEEP

    1536:2L1YZRemnhY0X1+Q3jaHPjbIbnFJ8v6sqKoO4o0iD8:22ZPhhzOHobnv6oOz0iA

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:64112

FRERE-57054.portmap.host:64112

solutions-stunning.gl.at.ply.gg:64112:64112

solutions-stunning.gl.at.ply.gg:64112

Attributes
  • Install_directory

    %Public%

  • install_file

    XClient.exe

Targets

    • Target

      extfix.exe

    • Size

      75KB

    • MD5

      03ac7cea640de499ffd4d820cbf91aec

    • SHA1

      c5431178ad49172a65398770a03fecccc37f711f

    • SHA256

      c6ac39bb6bd04c72e7c1f23b6d98b7a3ae591efa9ef285458b27bef353a255cb

    • SHA512

      52186a0938de15b83873626f72f594219dc193b1d5b7fbec5d2577761488f3379d5cd42e6de205964f6dec5cdfc3023de36375da28a0146a5311ab0516f23d7c

    • SSDEEP

      1536:2L1YZRemnhY0X1+Q3jaHPjbIbnFJ8v6sqKoO4o0iD8:22ZPhhzOHobnv6oOz0iA

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks