General

  • Target

    XClient.exe

  • Size

    83KB

  • Sample

    250118-wb1phs1jcn

  • MD5

    c1d3a7d174afa1e7c9c8005ae0a33a6d

  • SHA1

    c52819e3fe93af8156046cbc2002e4c895072a9a

  • SHA256

    2d1e8047e2ded5efb6eb40b598128d026d68f5202893dce72c3dcbd4c260b8e7

  • SHA512

    0343d57aae17c7d985477e5ab60b5655f588775356c3b43b7a932bb56a04c9ea6fb7ab6daae62013ed3dcc531d44c04a7ce00814b01cd09a07f9bf9cbeb35089

  • SSDEEP

    1536:5u/rlJEdXdakv+bklBfEqIw6RqymrBS+jrOueqZjP6Ub:5is+bklBu49SirOup0e

Malware Config

Targets

    • Target

      XClient.exe

    • Size

      83KB

    • MD5

      c1d3a7d174afa1e7c9c8005ae0a33a6d

    • SHA1

      c52819e3fe93af8156046cbc2002e4c895072a9a

    • SHA256

      2d1e8047e2ded5efb6eb40b598128d026d68f5202893dce72c3dcbd4c260b8e7

    • SHA512

      0343d57aae17c7d985477e5ab60b5655f588775356c3b43b7a932bb56a04c9ea6fb7ab6daae62013ed3dcc531d44c04a7ce00814b01cd09a07f9bf9cbeb35089

    • SSDEEP

      1536:5u/rlJEdXdakv+bklBfEqIw6RqymrBS+jrOueqZjP6Ub:5is+bklBu49SirOup0e

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks