Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    XCli1ent.exe

  • Size

    36KB

  • Sample

    250301-txctgavzht

  • MD5

    3d8ec94b7dcfaf52bb472918378b49a3

  • SHA1

    f868a911a25973f330ec2b56e50a746e6f32b14d

  • SHA256

    0e2ec9b0d60ba6bfc32a86dce7ed5e60d67fb142d4d14bb4a11956fe8b19d7d9

  • SHA512

    a57ac00fdc6377469d3a95bdc2715e68ca408aecf8b7e46444f401f8d93e787a5c1485886109f833b9771d07e9866610e808ba756167f55eef13750ff81f59d7

  • SSDEEP

    768:DeVXtHcDQZS9rc50UZmx/F89RF6OOMh6QJP:D8dH+o51OF89RF6OOMQy

Malware Config

Extracted

Family

xworm

Version

5.0

C2

database-victoria.gl.at.ply.gg:55358

Mutex

eIDPhmFNz0rAKYvF

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XCli1ent.exe

    • Size

      36KB

    • MD5

      3d8ec94b7dcfaf52bb472918378b49a3

    • SHA1

      f868a911a25973f330ec2b56e50a746e6f32b14d

    • SHA256

      0e2ec9b0d60ba6bfc32a86dce7ed5e60d67fb142d4d14bb4a11956fe8b19d7d9

    • SHA512

      a57ac00fdc6377469d3a95bdc2715e68ca408aecf8b7e46444f401f8d93e787a5c1485886109f833b9771d07e9866610e808ba756167f55eef13750ff81f59d7

    • SSDEEP

      768:DeVXtHcDQZS9rc50UZmx/F89RF6OOMh6QJP:D8dH+o51OF89RF6OOMQy

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks