General

  • Target

    XClient.exe

  • Size

    75KB

  • Sample

    241203-xbanrsxrgt

  • MD5

    003c4990fc29b1f061da78bf3ca09a6c

  • SHA1

    8d3595ab2dec45af4adc27a60978cf755bc56648

  • SHA256

    3c0eee1cd6acf5a20ab4118d72b52201cd62d5ab8f4a08982668a7a88e30d29f

  • SHA512

    22c567c0404a3783c0d0526ca8d6d3f37b6a2bfcae1f4d125cc54e322a61c1e1fd9a267a9bb7e9d8947127f93d336649ff81e41bfed1197126d258b32443e835

  • SSDEEP

    1536:81epeoxmXwM8R9P8iX6E63mE+bblBnmIW1X65ESkbO/QpZY9O:vJIgM8RV8iq9l+bzmIW1MESeOYpZwO

Malware Config

Extracted

Family

xworm

C2

awktuah-53681.portmap.host:53681

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    SecurityHealthSystray.exe

Targets

    • Target

      XClient.exe

    • Size

      75KB

    • MD5

      003c4990fc29b1f061da78bf3ca09a6c

    • SHA1

      8d3595ab2dec45af4adc27a60978cf755bc56648

    • SHA256

      3c0eee1cd6acf5a20ab4118d72b52201cd62d5ab8f4a08982668a7a88e30d29f

    • SHA512

      22c567c0404a3783c0d0526ca8d6d3f37b6a2bfcae1f4d125cc54e322a61c1e1fd9a267a9bb7e9d8947127f93d336649ff81e41bfed1197126d258b32443e835

    • SSDEEP

      1536:81epeoxmXwM8R9P8iX6E63mE+bblBnmIW1X65ESkbO/QpZY9O:vJIgM8RV8iq9l+bzmIW1MESeOYpZwO

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks