General

  • Target

    XClient.exe

  • Size

    33KB

  • Sample

    250121-hq9zva1rck

  • MD5

    843daa234f9b31c8f22c433971b0b086

  • SHA1

    3c5f573f61e89c1a113fe907e5831e4be5dc5a4c

  • SHA256

    f965e1f1dcbf5efaa48c4e4d14691e6d378d9caec1352a85ee06d0ebfc43eca7

  • SHA512

    0da56ef71bebb09550cb666b6aa72d0f36e7aff12212da8fd523dd0450a211226d8106c136951d483813a76455b6ae12f711e6ea6513b3ff63c304b5d93fbfd0

  • SSDEEP

    384:nl+PkjD9+E5MFs7iui8L7zKM42pfL3iB7OxVqWqKRApkFXBLTsOZwpGN2v99Ikun:l+CD93W03v42JiB70lVF49jXOjhwbi

Malware Config

Extracted

Family

xworm

Version

5.0

C2

general-hebrew.gl.at.ply.gg:24614

Mutex

cBWzGpKKIzANTO2p

Attributes
  • install_file

    svchost.exe

aes.plain

Extracted

Family

xworm

Version

3.0

C2

plus-loves.gl.at.ply.gg:59327

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      XClient.exe

    • Size

      33KB

    • MD5

      843daa234f9b31c8f22c433971b0b086

    • SHA1

      3c5f573f61e89c1a113fe907e5831e4be5dc5a4c

    • SHA256

      f965e1f1dcbf5efaa48c4e4d14691e6d378d9caec1352a85ee06d0ebfc43eca7

    • SHA512

      0da56ef71bebb09550cb666b6aa72d0f36e7aff12212da8fd523dd0450a211226d8106c136951d483813a76455b6ae12f711e6ea6513b3ff63c304b5d93fbfd0

    • SSDEEP

      384:nl+PkjD9+E5MFs7iui8L7zKM42pfL3iB7OxVqWqKRApkFXBLTsOZwpGN2v99Ikun:l+CD93W03v42JiB70lVF49jXOjhwbi

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Xworm Payload

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks