General

  • Target

    c1378ff7aaacea446762f5878ec501260bcdeb869e06a8f0a25845845183395cN.exe

  • Size

    159KB

  • Sample

    250120-ep9qxazqfs

  • MD5

    f3b25838fa8d402f6c93ddd23979b810

  • SHA1

    3935445639b0373ff59c5406315a480678e80f9e

  • SHA256

    c1378ff7aaacea446762f5878ec501260bcdeb869e06a8f0a25845845183395c

  • SHA512

    a66f7dbb3726a6fd116f6cb9229fb9f06879bdf9e5a550bd64582fded71d9d9433fbf71b754f598f550436badfdae62a6d6ff7e1ac91c41c203162280c583715

  • SSDEEP

    3072:0325N7aVopufIeZuVGoFkfAylFYOKYoGCllFhdoH3hZ9Roe2eX9px:j1U8peZuVDRkClAXhT2eF9

Malware Config

Extracted

Family

xworm

C2

indian-tall.gl.at.ply.gg:65520

Attributes
  • Install_directory

    %Temp%

  • install_file

    XClient.exe

  • pastebin_url

    https://pastebin.com/raw/wXYjM7Vm

Targets

    • Target

      c1378ff7aaacea446762f5878ec501260bcdeb869e06a8f0a25845845183395cN.exe

    • Size

      159KB

    • MD5

      f3b25838fa8d402f6c93ddd23979b810

    • SHA1

      3935445639b0373ff59c5406315a480678e80f9e

    • SHA256

      c1378ff7aaacea446762f5878ec501260bcdeb869e06a8f0a25845845183395c

    • SHA512

      a66f7dbb3726a6fd116f6cb9229fb9f06879bdf9e5a550bd64582fded71d9d9433fbf71b754f598f550436badfdae62a6d6ff7e1ac91c41c203162280c583715

    • SSDEEP

      3072:0325N7aVopufIeZuVGoFkfAylFYOKYoGCllFhdoH3hZ9Roe2eX9px:j1U8peZuVDRkClAXhT2eF9

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks