General

  • Target

    XClieגnt.exe

  • Size

    58KB

  • Sample

    250125-wbdjzsvqen

  • MD5

    1746345f5fd33f0b13dee19376ce7a22

  • SHA1

    275f4029a75588c06eb121215b25cf1ddf5438e0

  • SHA256

    6843a82e9cf4912c21b513d151b1e21d7ea427d3aae206e21fd6c95a4016a92d

  • SHA512

    113262cdb9803b3759d94bac6661ddc1554a4255a42cf630d97d99e8baae5294c6e3a266210a904798c4c124654cf6b933bcfc7bb9b21d16de29482e16e6d3c8

  • SSDEEP

    1536:n7BlfGmh4KqNPbbm/8kbPX5wW3WJ6hROXrap:7HGmh41lG/8kbPeWROXrQ

Malware Config

Extracted

Family

xworm

C2

sponef159-35748.portmap.host:35748

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot7508868671:AAG6XIOhz39IrQIUnjub1TKVOVZHfdjpsvM/sendMessage?chat_id=6094400048

Targets

    • Target

      XClieגnt.exe

    • Size

      58KB

    • MD5

      1746345f5fd33f0b13dee19376ce7a22

    • SHA1

      275f4029a75588c06eb121215b25cf1ddf5438e0

    • SHA256

      6843a82e9cf4912c21b513d151b1e21d7ea427d3aae206e21fd6c95a4016a92d

    • SHA512

      113262cdb9803b3759d94bac6661ddc1554a4255a42cf630d97d99e8baae5294c6e3a266210a904798c4c124654cf6b933bcfc7bb9b21d16de29482e16e6d3c8

    • SSDEEP

      1536:n7BlfGmh4KqNPbbm/8kbPX5wW3WJ6hROXrap:7HGmh41lG/8kbPeWROXrQ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks