General

  • Target

    045334c2bdc1eb9eb76036c2cae217fe3c1e7fd4f41bb849c4ba42a6c67cad21N.exe

  • Size

    63KB

  • Sample

    241231-w8yanatjey

  • MD5

    dfd48ef85c854afb7aa3a8d101ab5050

  • SHA1

    253d72b188c6f7026c191eef7ed99367cd7ddfdb

  • SHA256

    045334c2bdc1eb9eb76036c2cae217fe3c1e7fd4f41bb849c4ba42a6c67cad21

  • SHA512

    9e57681006f0224bc1484722eac8a2eb698e9ffa505ca0a3abd846a1e01448f56ee35ef20d02efcecc38d08782ec280468b4aa9f16a97c00c2148bfbc863f625

  • SSDEEP

    1536:SIfKqlxoqCjVQVw28BBgdE9rIuVO/KbHEMaDdnYi96jdtOU3iK:SIfKCxCjj20SdE9EeO/KbHEHRvCtOU3N

Malware Config

Extracted

Family

xworm

C2

ii-heavy.gl.at.ply.gg:45541:45541

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    XClient.exe

Targets

    • Target

      045334c2bdc1eb9eb76036c2cae217fe3c1e7fd4f41bb849c4ba42a6c67cad21N.exe

    • Size

      63KB

    • MD5

      dfd48ef85c854afb7aa3a8d101ab5050

    • SHA1

      253d72b188c6f7026c191eef7ed99367cd7ddfdb

    • SHA256

      045334c2bdc1eb9eb76036c2cae217fe3c1e7fd4f41bb849c4ba42a6c67cad21

    • SHA512

      9e57681006f0224bc1484722eac8a2eb698e9ffa505ca0a3abd846a1e01448f56ee35ef20d02efcecc38d08782ec280468b4aa9f16a97c00c2148bfbc863f625

    • SSDEEP

      1536:SIfKqlxoqCjVQVw28BBgdE9rIuVO/KbHEMaDdnYi96jdtOU3iK:SIfKCxCjj20SdE9EeO/KbHEHRvCtOU3N

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks