General

  • Target

    XClient.exe

  • Size

    33KB

  • Sample

    250209-h8bj1azkcs

  • MD5

    ab0e7a5649705238576beb18c47d9795

  • SHA1

    a07d6746796368d3aec69dbf3911de403d538540

  • SHA256

    3bf5cfa30960b4f67073f9956e70d35001ba8d7b857bb0197497b65925a2374e

  • SHA512

    82c5093173d2ab7939401534a625380b3a44cceb5f83c9c3bd0ccdae6a6fae30a2330809a004f3caf4bdf4f3407a98d7a149872a0d2d3923baddaef122858055

  • SSDEEP

    384:9F+PkjD9+E5MFs7iui8L7zKM42pfL3iB7OxVqWqKRApkFXBLTsOZwpGN2v99Ikuq:H+CD93W03v42JiB70lVF49jsOjhrbJ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

46.146.38.35:7000

Mutex

aQXmG9TBYVjFC5jJ

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

xworm

Version

3.0

C2

plus-loves.gl.at.ply.gg:59327

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      XClient.exe

    • Size

      33KB

    • MD5

      ab0e7a5649705238576beb18c47d9795

    • SHA1

      a07d6746796368d3aec69dbf3911de403d538540

    • SHA256

      3bf5cfa30960b4f67073f9956e70d35001ba8d7b857bb0197497b65925a2374e

    • SHA512

      82c5093173d2ab7939401534a625380b3a44cceb5f83c9c3bd0ccdae6a6fae30a2330809a004f3caf4bdf4f3407a98d7a149872a0d2d3923baddaef122858055

    • SSDEEP

      384:9F+PkjD9+E5MFs7iui8L7zKM42pfL3iB7OxVqWqKRApkFXBLTsOZwpGN2v99Ikuq:H+CD93W03v42JiB70lVF49jsOjhrbJ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Xworm Payload

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks