General

  • Target

    XClient.exe

  • Size

    82KB

  • Sample

    250121-ka38gavnbs

  • MD5

    e3a406131824aa10710a92340dfb15d6

  • SHA1

    1628ebcfc506987fb6a0345982203a996a2313bd

  • SHA256

    bdd3b9c3ca881508c48d75b80d6b57a43179a4b96606a60a4a361feb84ee2a3b

  • SHA512

    d982a32441f0596201c127f3d14839ba8e2cf5cd5a7dbed9d2f598dacc132a6a78ec78cd37f2b0772af61b08f89ffd38946babb4095413e4166776dd6fb6c689

  • SSDEEP

    1536:8Kw5IeMK0SJEpZcIpZ+Zdd49bdm3UykGmF6LzHVgUeuOoJWRPvx5wzn+5:wFQSJwtO29bdmrJheuOooRPvUL+5

Malware Config

Extracted

Family

xworm

C2

blood-pattern.gl.at.ply.gg:5353

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7704029346:AAHPre1lXQa0UfPCpOUXJZ9UXA9mFxvH4Gk/sendMessage?chat_id=7590668020

Targets

    • Target

      XClient.exe

    • Size

      82KB

    • MD5

      e3a406131824aa10710a92340dfb15d6

    • SHA1

      1628ebcfc506987fb6a0345982203a996a2313bd

    • SHA256

      bdd3b9c3ca881508c48d75b80d6b57a43179a4b96606a60a4a361feb84ee2a3b

    • SHA512

      d982a32441f0596201c127f3d14839ba8e2cf5cd5a7dbed9d2f598dacc132a6a78ec78cd37f2b0772af61b08f89ffd38946babb4095413e4166776dd6fb6c689

    • SSDEEP

      1536:8Kw5IeMK0SJEpZcIpZ+Zdd49bdm3UykGmF6LzHVgUeuOoJWRPvx5wzn+5:wFQSJwtO29bdmrJheuOooRPvUL+5

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks