General

  • Target

    XClient.exe

  • Size

    82KB

  • Sample

    250121-1danbs1qdx

  • MD5

    5426b946b13d22a259acc2c54a2b29cc

  • SHA1

    f30ff456b32744540aef13831a2eff8b06f73a21

  • SHA256

    ba7870c7dc4758619f3177530963242ac3f60377d6336f9de21cca95f70f77da

  • SHA512

    955c079e8b08f27e81720a2f790e340e2f05004463fe1fd00b1e2119246f0be03a5180919482b5fbd274f08905045b21e477978269e2b9a5229405274cbf3fd6

  • SSDEEP

    1536:oBgdBvNP/F/ADakoMmZlRqEN2kBM3Dm9bVmeSUHf969PSOo0yOqicMGwn+M:51dUIzb/kDm9bVmsiKOXyricM1+M

Malware Config

Extracted

Family

xworm

C2

publication-glossary.gl.at.ply.gg:26117

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7704029346:AAHPre1lXQa0UfPCpOUXJZ9UXA9mFxvH4Gk/sendMessage?chat_id=7590668020

Targets

    • Target

      XClient.exe

    • Size

      82KB

    • MD5

      5426b946b13d22a259acc2c54a2b29cc

    • SHA1

      f30ff456b32744540aef13831a2eff8b06f73a21

    • SHA256

      ba7870c7dc4758619f3177530963242ac3f60377d6336f9de21cca95f70f77da

    • SHA512

      955c079e8b08f27e81720a2f790e340e2f05004463fe1fd00b1e2119246f0be03a5180919482b5fbd274f08905045b21e477978269e2b9a5229405274cbf3fd6

    • SSDEEP

      1536:oBgdBvNP/F/ADakoMmZlRqEN2kBM3Dm9bVmeSUHf969PSOo0yOqicMGwn+M:51dUIzb/kDm9bVmsiKOXyricM1+M

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks