General

  • Target

    4978a378806fd5d68c08ad4602f80d3f5f1f870cb072475bd32b7a8ca32a3d88

  • Size

    511KB

  • Sample

    241204-sjjjesvjfl

  • MD5

    632f722953592e348c533977a5f251d7

  • SHA1

    d4e62b7060f00888d43eb1fbb0d0f8f5fbd8ef4d

  • SHA256

    4978a378806fd5d68c08ad4602f80d3f5f1f870cb072475bd32b7a8ca32a3d88

  • SHA512

    1b41503d38a2862e499ec5c21c7510cb8a95676eb5eca546910ddddf09a1c1aaf0216c572119f0c3ffc0f7a0a4516823cae9f32b27bea381c03d4c07dcaaee56

  • SSDEEP

    12288:HCfia2Q+RH4w8yqJ3ItYvk71CyBC7Lkf/:HYiHQ+R5jYc7p

Malware Config

Extracted

Family

xworm

C2

104.250.180.178:7061

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      4978a378806fd5d68c08ad4602f80d3f5f1f870cb072475bd32b7a8ca32a3d88

    • Size

      511KB

    • MD5

      632f722953592e348c533977a5f251d7

    • SHA1

      d4e62b7060f00888d43eb1fbb0d0f8f5fbd8ef4d

    • SHA256

      4978a378806fd5d68c08ad4602f80d3f5f1f870cb072475bd32b7a8ca32a3d88

    • SHA512

      1b41503d38a2862e499ec5c21c7510cb8a95676eb5eca546910ddddf09a1c1aaf0216c572119f0c3ffc0f7a0a4516823cae9f32b27bea381c03d4c07dcaaee56

    • SSDEEP

      12288:HCfia2Q+RH4w8yqJ3ItYvk71CyBC7Lkf/:HYiHQ+R5jYc7p

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks