Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Loader.exe

  • Size

    4.6MB

  • Sample

    250301-xsdrrayrv5

  • MD5

    33f2f30de4bea3826730bfaa1a01186d

  • SHA1

    7ec891eb7eb4ad408c46bdb4ec05860480dd3178

  • SHA256

    71356b2228b9e2da8b805cdda714c160b0d8e410beea629ba32af7f341718295

  • SHA512

    743a611038bcb259f5f7fc5cf3751fa5f9243d0c4e58d678849a57c29a31e2ea3733f08e0b1973e35cdd14093eb87524f94516d1be8ff0cfc8d6b40310339fa9

  • SSDEEP

    98304:cFVR1FwhUEYVa02weZZuISA12HsTYtXztHfBu3fOv:0VRQhfYVHUZuVp9zZBuW

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    x69XClient.exe

  • pastebin_url

    https://pastebin.com/raw/7KHrn9yR

  • telegram

    https://api.telegram.org/bot7600824685:AAHOEzTxziP7s4Wf095smbzn6FrkvRgCwVk/sendMessage?chat_id=7600824685

Targets

    • Target

      Loader.exe

    • Size

      4.6MB

    • MD5

      33f2f30de4bea3826730bfaa1a01186d

    • SHA1

      7ec891eb7eb4ad408c46bdb4ec05860480dd3178

    • SHA256

      71356b2228b9e2da8b805cdda714c160b0d8e410beea629ba32af7f341718295

    • SHA512

      743a611038bcb259f5f7fc5cf3751fa5f9243d0c4e58d678849a57c29a31e2ea3733f08e0b1973e35cdd14093eb87524f94516d1be8ff0cfc8d6b40310339fa9

    • SSDEEP

      98304:cFVR1FwhUEYVa02weZZuISA12HsTYtXztHfBu3fOv:0VRQhfYVHUZuVp9zZBuW

    • Detect Xworm Payload

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks