General

  • Target

    XClient.exe

  • Size

    101KB

  • Sample

    250207-h7yyxatmay

  • MD5

    7e7c78851deff9d56a07aa149014f4f0

  • SHA1

    5f4caa9c70e3aa6994c76a416a3192b272879475

  • SHA256

    39505bf9b61e4886a5e886d9ec0b50f00ce691c8c7c6934fdb62a90ee0eb7997

  • SHA512

    0e07c6c400472d4322c438efc1e3a2e528dc764ee342baaddd25e75db4a3005d717f0e6d4b975eba6a7acb8483515f7e82b0887dbf0d42679c4c83c68fe00625

  • SSDEEP

    1536:JxqjQ+P04wsmJCgQ5eVOH9SNI5bj/OWVsqXl9ikVruPWVRDFaNIp1kbgwyr:sr85CAVOHUNIbj/OYlXqe1EIbkbgnr

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:6000

74.249.113.208:6000

Attributes
  • install_file

    USB.exe

Targets

    • Target

      XClient.exe

    • Size

      101KB

    • MD5

      7e7c78851deff9d56a07aa149014f4f0

    • SHA1

      5f4caa9c70e3aa6994c76a416a3192b272879475

    • SHA256

      39505bf9b61e4886a5e886d9ec0b50f00ce691c8c7c6934fdb62a90ee0eb7997

    • SHA512

      0e07c6c400472d4322c438efc1e3a2e528dc764ee342baaddd25e75db4a3005d717f0e6d4b975eba6a7acb8483515f7e82b0887dbf0d42679c4c83c68fe00625

    • SSDEEP

      1536:JxqjQ+P04wsmJCgQ5eVOH9SNI5bj/OWVsqXl9ikVruPWVRDFaNIp1kbgwyr:sr85CAVOHUNIbj/OYlXqe1EIbkbgnr

    • Detect Neshta payload

    • Detect Xworm Payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks