Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    FUD.vbs

  • Size

    325KB

  • Sample

    250228-s4cava1sdx

  • MD5

    d525be35ac5b7de70edb7c00529f1d83

  • SHA1

    eef5cd4c355487132d225492acdc425fb0fe606d

  • SHA256

    f9f35704de5a2355e9b8b7107613736b5501573cfb9794126867ccd73100ea98

  • SHA512

    32e399504a0669e0c83872a947cf24955489f2b3f75dae83cec2798681f4249d6bac02f861436fcbf6b8d2321045ab7fbc6c006bf33ca1402429ce799e254830

  • SSDEEP

    6144:PAbSQwEhvxxx06qUY2fVHavDdl8PI76KF51u7WJVzZF:PAbBlhqp2fZsDdlYI77BVlF

Malware Config

Extracted

Family

xworm

C2

required-mold.gl.at.ply.gg:25146

feedback-both.gl.at.ply.gg:25146

192.168.1.223:25146

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Xclient.exe

Targets

    • Target

      FUD.vbs

    • Size

      325KB

    • MD5

      d525be35ac5b7de70edb7c00529f1d83

    • SHA1

      eef5cd4c355487132d225492acdc425fb0fe606d

    • SHA256

      f9f35704de5a2355e9b8b7107613736b5501573cfb9794126867ccd73100ea98

    • SHA512

      32e399504a0669e0c83872a947cf24955489f2b3f75dae83cec2798681f4249d6bac02f861436fcbf6b8d2321045ab7fbc6c006bf33ca1402429ce799e254830

    • SSDEEP

      6144:PAbSQwEhvxxx06qUY2fVHavDdl8PI76KF51u7WJVzZF:PAbBlhqp2fZsDdlYI77BVlF

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks