General

  • Target

    3060dfc3fef4f36d8712226d46a245dbd6be1a30badab982b91e1cd85127812bN.exe

  • Size

    50KB

  • Sample

    241203-nj43xaymgj

  • MD5

    77ca91b6e55138de322b0b921c62fc10

  • SHA1

    cf621d2eecde80a409c35d5662cefe88a9f8bfd4

  • SHA256

    3060dfc3fef4f36d8712226d46a245dbd6be1a30badab982b91e1cd85127812b

  • SHA512

    0fc0bc642623ef86f076fa6d71bfafbf1cc9cbfddb2d44d8ffd7744c6d9c2f1548deb900ae85fd9f069d40d494ff8d7dbb081f7b7dec8552b8ebd87f22fbfcd2

  • SSDEEP

    1536:0Q1Zw+K5/jjV6wTO+bOekp4G60r0MOT/Lg:e5bjMz+bOIA/OTTg

Malware Config

Extracted

Family

xworm

C2

24.ip.gl.ply.gg:12722

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      3060dfc3fef4f36d8712226d46a245dbd6be1a30badab982b91e1cd85127812bN.exe

    • Size

      50KB

    • MD5

      77ca91b6e55138de322b0b921c62fc10

    • SHA1

      cf621d2eecde80a409c35d5662cefe88a9f8bfd4

    • SHA256

      3060dfc3fef4f36d8712226d46a245dbd6be1a30badab982b91e1cd85127812b

    • SHA512

      0fc0bc642623ef86f076fa6d71bfafbf1cc9cbfddb2d44d8ffd7744c6d9c2f1548deb900ae85fd9f069d40d494ff8d7dbb081f7b7dec8552b8ebd87f22fbfcd2

    • SSDEEP

      1536:0Q1Zw+K5/jjV6wTO+bOekp4G60r0MOT/Lg:e5bjMz+bOIA/OTTg

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks