General

  • Target

    ExcellentSkin.exe

  • Size

    65KB

  • Sample

    250302-le15ca1vhy

  • MD5

    cd3ab4a2a69f0dbb8082710cd27734b4

  • SHA1

    a8c759c3e080738081272896e0f263f9e39de98b

  • SHA256

    dbe5501ab97362e220ae913a75b6f251a1d890971cf2a962b0f7248ec7808daf

  • SHA512

    c7fdba39ba403b53fc4baaeab276a89eccddc7477b2c057f17f943be135da59bc70e1b4574bc1d22290a27497051a56bee177e58178aa1b176813e50688215ca

  • SSDEEP

    1536:yLtIgPGIjoghF5YX5JCFU+b7wnzMSIM4Y6lPUhWUONrogIk0Zk:YIgSgh3I5JCG+b7A8UOtJ0Zk

Malware Config

Extracted

Family

xworm

C2

all-advocacy.gl.at.ply.gg:33270

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      ExcellentSkin.exe

    • Size

      65KB

    • MD5

      cd3ab4a2a69f0dbb8082710cd27734b4

    • SHA1

      a8c759c3e080738081272896e0f263f9e39de98b

    • SHA256

      dbe5501ab97362e220ae913a75b6f251a1d890971cf2a962b0f7248ec7808daf

    • SHA512

      c7fdba39ba403b53fc4baaeab276a89eccddc7477b2c057f17f943be135da59bc70e1b4574bc1d22290a27497051a56bee177e58178aa1b176813e50688215ca

    • SSDEEP

      1536:yLtIgPGIjoghF5YX5JCFU+b7wnzMSIM4Y6lPUhWUONrogIk0Zk:YIgSgh3I5JCG+b7A8UOtJ0Zk

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks