General

  • Target

    XClient.exe

  • Size

    40KB

  • Sample

    241203-x6al9azmfv

  • MD5

    83a6ff5d8a2a05c79fae360e5aa6a757

  • SHA1

    e8b4b77a09e06feb3d0b522be1184ec357d1b399

  • SHA256

    f8de00626bd91a767db53e420e2a72cb7635133e95aa7dd765fa197b8f902ffc

  • SHA512

    abcebaa568d8011338cecf66fdf96d8dfeb4a67be4e4543b57bd52c2833a2cd9f937eee5b09e6bc1f646080b44da901ecad0e6009e8bc1292e60a071881f4ed4

  • SSDEEP

    768:bUIDwCrxY4mpc9i32v6hCuuJf27ZZfFWPG9/5J6OOwh0jGbF:bdDwCFY4gckGwCuuJfKFv9/5J6OOwCCZ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

cities-constraints.gl.at.ply.gg:16265

Mutex

WbfRfPKM1s3tqH9O

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      40KB

    • MD5

      83a6ff5d8a2a05c79fae360e5aa6a757

    • SHA1

      e8b4b77a09e06feb3d0b522be1184ec357d1b399

    • SHA256

      f8de00626bd91a767db53e420e2a72cb7635133e95aa7dd765fa197b8f902ffc

    • SHA512

      abcebaa568d8011338cecf66fdf96d8dfeb4a67be4e4543b57bd52c2833a2cd9f937eee5b09e6bc1f646080b44da901ecad0e6009e8bc1292e60a071881f4ed4

    • SSDEEP

      768:bUIDwCrxY4mpc9i32v6hCuuJf27ZZfFWPG9/5J6OOwh0jGbF:bdDwCFY4gckGwCuuJfKFv9/5J6OOwCCZ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks