General

  • Target

    https://cdn.discordapp.com/attachments/1331926146660700191/1332017148335357974/XClie1111111111111111111111111111111111111111nt.zip?ex=6793b923&is=679267a3&hm=c4334304b421fc850b10d37cb04adcaa2c66a8d39a3ef0194d2f4d3082baaeb7&

  • Sample

    250123-tgblgavlht

Malware Config

Extracted

Family

xworm

C2

sanek416-59257.portmap.host:59257

Attributes
  • Install_directory

    %Temp%

  • install_file

    Runtimebroker.exe

Targets

    • Target

      https://cdn.discordapp.com/attachments/1331926146660700191/1332017148335357974/XClie1111111111111111111111111111111111111111nt.zip?ex=6793b923&is=679267a3&hm=c4334304b421fc850b10d37cb04adcaa2c66a8d39a3ef0194d2f4d3082baaeb7&

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks