General

  • Target

    XClient.exe

  • Size

    40KB

  • Sample

    250125-wx71qawqfq

  • MD5

    9f86128beeb0e877bf86334d01d187f8

  • SHA1

    6cc0ca4ed81e0463603be0e5020bd2fb81a88de5

  • SHA256

    61025100af2521ccd9231dd8f23cdb91bb682a9888eb59fb1300a9daf7a41a21

  • SHA512

    b795f7d73d2f075c4caa838425422f4183c9ceeb386742eb8f3480a039f93705da2316acc92195eed72d81185775460a8ad98df712e2091e9306473477c1d4db

  • SSDEEP

    768:+tvDRWjEry5lLJKuuwhSYypufFWPa9b5kn6POwh0ambO:2vNWjQ2VJKuuwhSjEFv9bk6POwazq

Malware Config

Extracted

Family

xworm

Version

5.0

C2

performance-ha.gl.at.ply.gg:33365:2137

performance-ha.gl.at.ply.gg:2137

performance-ha.gl.at.ply.gg:2137:2137

127.0.0.1:2137:2137

147.185.221.19:2137

147.185.221.19:2137:2137

147.185.221.19:33365:2137

Mutex

OZ8vcMhzyOrtc3Gz

Attributes
  • Install_directory

    %AppData%

  • install_file

    Wiindows Update.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      40KB

    • MD5

      9f86128beeb0e877bf86334d01d187f8

    • SHA1

      6cc0ca4ed81e0463603be0e5020bd2fb81a88de5

    • SHA256

      61025100af2521ccd9231dd8f23cdb91bb682a9888eb59fb1300a9daf7a41a21

    • SHA512

      b795f7d73d2f075c4caa838425422f4183c9ceeb386742eb8f3480a039f93705da2316acc92195eed72d81185775460a8ad98df712e2091e9306473477c1d4db

    • SSDEEP

      768:+tvDRWjEry5lLJKuuwhSYypufFWPa9b5kn6POwh0ambO:2vNWjQ2VJKuuwhSjEFv9bk6POwazq

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks