General

  • Target

    XClient.exe

  • Size

    210KB

  • Sample

    250123-zksbaasnft

  • MD5

    9bfbec6717ad855d87e16a7a36cf2060

  • SHA1

    ad8feff48191bb239ae893caeab35e539735069c

  • SHA256

    8eaad7c6ce7471c8cba5b274b974e11427dcdb743b64480d9386afbd9aaebc79

  • SHA512

    168befaf6d0586a5173e8bf5f6e9efd6afac1b603b117c93464d49a806943cb6b3ecb8f4c318f1cf94e3b12c9b8e72dd0dd1228ca51d4c8eb290c180b17c780b

  • SSDEEP

    3072:EPczFJ9Z4OClv8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLn7:ZRJ9oUhcX7elbKTuq9bfF/H9d9n

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

JdATxGGlLfwymoJ6

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • pastebin_url

    https://pastebin.com/raw/4YfEusCJ

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      210KB

    • MD5

      9bfbec6717ad855d87e16a7a36cf2060

    • SHA1

      ad8feff48191bb239ae893caeab35e539735069c

    • SHA256

      8eaad7c6ce7471c8cba5b274b974e11427dcdb743b64480d9386afbd9aaebc79

    • SHA512

      168befaf6d0586a5173e8bf5f6e9efd6afac1b603b117c93464d49a806943cb6b3ecb8f4c318f1cf94e3b12c9b8e72dd0dd1228ca51d4c8eb290c180b17c780b

    • SSDEEP

      3072:EPczFJ9Z4OClv8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLn7:ZRJ9oUhcX7elbKTuq9bfF/H9d9n

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks