General

  • Target

    XClient.exe

  • Size

    64KB

  • Sample

    241203-zdfc5sylck

  • MD5

    f78aaa2ed14328c0566fb6ee84e9ca5d

  • SHA1

    32fdcc0eb824f46f41e21d5bc1bf0d3ec8e57a71

  • SHA256

    52dedc736371a5e6264336b06f8ed4ec60148eac2d4e53cb0184426e518fc0ef

  • SHA512

    22cac650566fe36f24dcdbb92f4cdd3e75e1597bfa7c8f90b174974f4bcbfe7826be0ebdf5fd4cd6949b724e155604baf4681fdec9d800f2270220f689e01029

  • SSDEEP

    1536:RtXfzM1SDy2ieLVzFuxb7+bYKU+QD716zufOYPDmZu5:77OWyGFuxb7+bY7nOYbX5

Malware Config

Extracted

Family

xworm

C2

guide-greatly.gl.at.ply.gg:16040

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    SecurityHealthSystray.exe

Targets

    • Target

      XClient.exe

    • Size

      64KB

    • MD5

      f78aaa2ed14328c0566fb6ee84e9ca5d

    • SHA1

      32fdcc0eb824f46f41e21d5bc1bf0d3ec8e57a71

    • SHA256

      52dedc736371a5e6264336b06f8ed4ec60148eac2d4e53cb0184426e518fc0ef

    • SHA512

      22cac650566fe36f24dcdbb92f4cdd3e75e1597bfa7c8f90b174974f4bcbfe7826be0ebdf5fd4cd6949b724e155604baf4681fdec9d800f2270220f689e01029

    • SSDEEP

      1536:RtXfzM1SDy2ieLVzFuxb7+bYKU+QD716zufOYPDmZu5:77OWyGFuxb7+bY7nOYbX5

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks