General

  • Target

    Wave-Setup.exe

  • Size

    73KB

  • Sample

    241122-xnjr7sslgq

  • MD5

    c98b26b1cac8a447066be6bd5a933196

  • SHA1

    b22d43bc742b4cc866b62b2cfb62e8362e10163e

  • SHA256

    e6025c036e5f0bcd3142f2fea80ebe5416c3aa0b64e94d0b5a7c1577c651d609

  • SHA512

    98ea361a0c8c9f79e446bc0de58f23d23fa264d1741f2cb23141ad85f4e1cf45b7fcd18249473e48041ac3186d3793d0e6b1af1ea8393cf7429fd75c251c2e50

  • SSDEEP

    1536:YsqiPx3ozEViBTK2Y03OboS8k8gvS6AjhOSdNo4fHId:YsrPpUEVAe+OboS8kZuhOSdN7G

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7771

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • telegram

    https://api.telegram.org/bot7665061051:AAEotbTL5fqrPYkfW44hc7ymOmd_OEVX4KY/sendMessage?chat_id=5622184120

Targets

    • Target

      Wave-Setup.exe

    • Size

      73KB

    • MD5

      c98b26b1cac8a447066be6bd5a933196

    • SHA1

      b22d43bc742b4cc866b62b2cfb62e8362e10163e

    • SHA256

      e6025c036e5f0bcd3142f2fea80ebe5416c3aa0b64e94d0b5a7c1577c651d609

    • SHA512

      98ea361a0c8c9f79e446bc0de58f23d23fa264d1741f2cb23141ad85f4e1cf45b7fcd18249473e48041ac3186d3793d0e6b1af1ea8393cf7429fd75c251c2e50

    • SSDEEP

      1536:YsqiPx3ozEViBTK2Y03OboS8k8gvS6AjhOSdNo4fHId:YsrPpUEVAe+OboS8kZuhOSdN7G

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks