Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    t.exe

  • Size

    28.2MB

  • Sample

    250301-t4s42awsf1

  • MD5

    32537fc4fb43f3e452ebc55efa9c009c

  • SHA1

    106ae40680c3776de02ab2af413f6514d72c600f

  • SHA256

    6d02f6dd58e131cad086c3366a6e75bec7dc4a18c1caeb509c14f5b6e5a175b6

  • SHA512

    4769bce8d9605ca45611d0cab7ac9df257e677b6c70c1610a8a0bd85393dff80fd3e9c78b72654e6b316e4e5885694e62812fd3bf14b8a5908b791ab46005745

  • SSDEEP

    786432:Ntu0coshxWHVn6s6b64G71jaoCo1Ha2XykT9nCnx89f:bu0jyC6Fb6V71JCo1RjSG

Malware Config

Extracted

Family

xworm

Version

5.0

C2

thetest.selfhost.co:1339

Mutex

PQkNYlnsnnFAImsR

Attributes
  • Install_directory

    %AppData%

  • install_file

    DirectOutputService.exe

aes.plain

Targets

    • Target

      t.exe

    • Size

      28.2MB

    • MD5

      32537fc4fb43f3e452ebc55efa9c009c

    • SHA1

      106ae40680c3776de02ab2af413f6514d72c600f

    • SHA256

      6d02f6dd58e131cad086c3366a6e75bec7dc4a18c1caeb509c14f5b6e5a175b6

    • SHA512

      4769bce8d9605ca45611d0cab7ac9df257e677b6c70c1610a8a0bd85393dff80fd3e9c78b72654e6b316e4e5885694e62812fd3bf14b8a5908b791ab46005745

    • SSDEEP

      786432:Ntu0coshxWHVn6s6b64G71jaoCo1Ha2XykT9nCnx89f:bu0jyC6Fb6V71JCo1RjSG

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks