Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    XClient.exe

  • Size

    65KB

  • Sample

    250301-x622hazsgt

  • MD5

    b2b82399ba6e9a1dad5056d76fd7c38c

  • SHA1

    acd51a93c03e6375282c732e46dbba093d004277

  • SHA256

    b79174702d042f1f7fb9ae8edc60262397d736b34751eb1a3bc810c9a8728c46

  • SHA512

    9ba54b085761f397f8a7e0825e1d4bbba63662556bfe7a789f1895849bc6f8477d69953c75984cdac7fe501dc02954c6254943b60989934fa08331711644f75d

  • SSDEEP

    1536:m3/NH4JsOCr53ewg/pFNQLDOeP8Br1+kb1bQ11XyBGqOcgoP7SQ:oNH4+VNg/pFODpgckb1a8BGqOcgaSQ

Malware Config

Extracted

Family

xworm

C2

paypal-themselves.gl.at.ply.gg:34855

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    winaudiog.exe

Targets

    • Target

      XClient.exe

    • Size

      65KB

    • MD5

      b2b82399ba6e9a1dad5056d76fd7c38c

    • SHA1

      acd51a93c03e6375282c732e46dbba093d004277

    • SHA256

      b79174702d042f1f7fb9ae8edc60262397d736b34751eb1a3bc810c9a8728c46

    • SHA512

      9ba54b085761f397f8a7e0825e1d4bbba63662556bfe7a789f1895849bc6f8477d69953c75984cdac7fe501dc02954c6254943b60989934fa08331711644f75d

    • SSDEEP

      1536:m3/NH4JsOCr53ewg/pFNQLDOeP8Br1+kb1bQ11XyBGqOcgoP7SQ:oNH4+VNg/pFODpgckb1a8BGqOcgaSQ

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Modifies Windows Firewall

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks