General

  • Target

    a7dc20c072b03d3f20cbdc51b2e31cbebf7e7eaf122a846c5680a30294aa14e3.exe

  • Size

    41KB

  • Sample

    241202-b2dx8asnh1

  • MD5

    52ff9a82869822cfedc2f1994e4e11f8

  • SHA1

    d647748ac62cdf3224fc4d38e8e3f13d3d8770aa

  • SHA256

    a7dc20c072b03d3f20cbdc51b2e31cbebf7e7eaf122a846c5680a30294aa14e3

  • SHA512

    6a8881a4333a51638315943aa8f1476517fc31d2205055f82c952bbbbd641cf6df624accdf8f45f117984ce5f9324395f450f01bb1f0d21d5f3c177df6f98c75

  • SSDEEP

    768:thvGkOK5lJMU1BaO4CAr43McfJF5Pa9p+R6iOwhI3/ibro:tZzZ5lR143RrwRF49IR6iOw+aHo

Malware Config

Extracted

Family

xworm

Version

5.0

C2

45.141.27.119:5000

Mutex

Ry53kvOqTEmLHsQt

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      a7dc20c072b03d3f20cbdc51b2e31cbebf7e7eaf122a846c5680a30294aa14e3.exe

    • Size

      41KB

    • MD5

      52ff9a82869822cfedc2f1994e4e11f8

    • SHA1

      d647748ac62cdf3224fc4d38e8e3f13d3d8770aa

    • SHA256

      a7dc20c072b03d3f20cbdc51b2e31cbebf7e7eaf122a846c5680a30294aa14e3

    • SHA512

      6a8881a4333a51638315943aa8f1476517fc31d2205055f82c952bbbbd641cf6df624accdf8f45f117984ce5f9324395f450f01bb1f0d21d5f3c177df6f98c75

    • SSDEEP

      768:thvGkOK5lJMU1BaO4CAr43McfJF5Pa9p+R6iOwhI3/ibro:tZzZ5lR143RrwRF49IR6iOw+aHo

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks