Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    XClient.exe

  • Size

    207KB

  • Sample

    250301-w8pzaax1gs

  • MD5

    6871607d92969776391efd493707eedc

  • SHA1

    4a081720e336df47324b3a6e214e0be28754c07a

  • SHA256

    90315fd137f2160e8d11223200c03bc2488f906007a5511240b29e1773596827

  • SHA512

    74e437d5c95fc8019e954b93d71f6f0fe9bd8dc843153c791336bdee6ab25ed1fd3d75efa90645a60fa44c9cb43bf3dac20358d29fdbcadf157ccb559d8a2b12

  • SSDEEP

    1536:Ks12gfnC6iy/PuF99N0z6POCZ0wLU7uS+ENi9:nfJ2F99N06OC1LUXk9

Malware Config

Extracted

Family

xworm

Version

5.0

C2

thetest.selfhost.co:1339

Mutex

6fb9p9QDJ0BS5PDw

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    DirectOutputService.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      207KB

    • MD5

      6871607d92969776391efd493707eedc

    • SHA1

      4a081720e336df47324b3a6e214e0be28754c07a

    • SHA256

      90315fd137f2160e8d11223200c03bc2488f906007a5511240b29e1773596827

    • SHA512

      74e437d5c95fc8019e954b93d71f6f0fe9bd8dc843153c791336bdee6ab25ed1fd3d75efa90645a60fa44c9cb43bf3dac20358d29fdbcadf157ccb559d8a2b12

    • SSDEEP

      1536:Ks12gfnC6iy/PuF99N0z6POCZ0wLU7uS+ENi9:nfJ2F99N06OC1LUXk9

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks