General

  • Target

    JStaller.bat

  • Size

    836KB

  • Sample

    250302-d8et7sttes

  • MD5

    2686275418180ce5c188c5baf0427da9

  • SHA1

    764d86b850f03bc2a4fa88eaa9e4434ebe39ff54

  • SHA256

    953405057021d4ff8844aaa231590871e03cf136e50b2f5e758853ca76802481

  • SHA512

    a048d3251e0af5f1acf39f855a2226b82ca956dc826c4730279408e6cbc38b83ff7bfac5527c429ca39bf98a4a2b4571c853e87bd3554dbaf8b9f926090d8bb4

  • SSDEEP

    24576:0Fz47fYHX8qCwPSCuV4LTjgltYVk39I1V+JV4BmU:0GoCwrfjgLU+Jwp

Malware Config

Extracted

Family

xworm

C2

operates-rna.with.playit.plus:4377

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    XClient2.0.exe

Targets

    • Target

      JStaller.bat

    • Size

      836KB

    • MD5

      2686275418180ce5c188c5baf0427da9

    • SHA1

      764d86b850f03bc2a4fa88eaa9e4434ebe39ff54

    • SHA256

      953405057021d4ff8844aaa231590871e03cf136e50b2f5e758853ca76802481

    • SHA512

      a048d3251e0af5f1acf39f855a2226b82ca956dc826c4730279408e6cbc38b83ff7bfac5527c429ca39bf98a4a2b4571c853e87bd3554dbaf8b9f926090d8bb4

    • SSDEEP

      24576:0Fz47fYHX8qCwPSCuV4LTjgltYVk39I1V+JV4BmU:0GoCwrfjgLU+Jwp

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks