General

  • Target

    sex.exe

  • Size

    63KB

  • Sample

    250125-2ymdasvmhm

  • MD5

    0b244bc9a9d1b236e2a9ad1757088be3

  • SHA1

    f57f0e1373ede67afbe9832918c66161c16414dc

  • SHA256

    509fcc68364e499b667b19c3ba7ab1bedcb7eb0831adea59954e37e73a44f79e

  • SHA512

    d0c51da4bede55fa4b524c5604210587ead30b52499d7e9dd04e6735203021fdd3f04a6b77f7838b1c75797e21bfc10cfda1b2e35f6e9120659557fe261f9df5

  • SSDEEP

    1536:Y776WKPld2VaaKBab7jfmuQ6mS0mOvsVxZ:Au7PldztBab7jo+OvszZ

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:52412

chudai-52412.portmap.host:52412

Attributes
  • Install_directory

    %Temp%

  • install_file

    XClient.exe

Targets

    • Target

      sex.exe

    • Size

      63KB

    • MD5

      0b244bc9a9d1b236e2a9ad1757088be3

    • SHA1

      f57f0e1373ede67afbe9832918c66161c16414dc

    • SHA256

      509fcc68364e499b667b19c3ba7ab1bedcb7eb0831adea59954e37e73a44f79e

    • SHA512

      d0c51da4bede55fa4b524c5604210587ead30b52499d7e9dd04e6735203021fdd3f04a6b77f7838b1c75797e21bfc10cfda1b2e35f6e9120659557fe261f9df5

    • SSDEEP

      1536:Y776WKPld2VaaKBab7jfmuQ6mS0mOvsVxZ:Au7PldztBab7jo+OvszZ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks