General

  • Target

    injection.exe

  • Size

    623KB

  • Sample

    250106-2d9m4asqam

  • MD5

    927bfe05fe20529a0d2446b2b3fb326f

  • SHA1

    e09cef72f5deeba0c2b54ab6f8532003df9cb2ba

  • SHA256

    5cf0d331c890274f77c18eb8a90d911a50f452515371abbe47863413fac0838a

  • SHA512

    f16679811b448df10542d881e6576fb2bc9fc8421e7b68ae1cdfd8ed7684c7eb7ac073dac63795da06c8bbb008fb2e01748e76f5aefed4ad90e08430bf46693e

  • SSDEEP

    12288:eRRTKABlLm78h7d78LR3ArlQ5Ya2NA3X3uj:/ABI72d7ZlLa2S3X3m

Malware Config

Extracted

Family

xworm

C2

license-kings.gl.at.ply.gg:65464

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      injection.exe

    • Size

      623KB

    • MD5

      927bfe05fe20529a0d2446b2b3fb326f

    • SHA1

      e09cef72f5deeba0c2b54ab6f8532003df9cb2ba

    • SHA256

      5cf0d331c890274f77c18eb8a90d911a50f452515371abbe47863413fac0838a

    • SHA512

      f16679811b448df10542d881e6576fb2bc9fc8421e7b68ae1cdfd8ed7684c7eb7ac073dac63795da06c8bbb008fb2e01748e76f5aefed4ad90e08430bf46693e

    • SSDEEP

      12288:eRRTKABlLm78h7d78LR3ArlQ5Ya2NA3X3uj:/ABI72d7ZlLa2S3X3m

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Njrat family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks