General

  • Target

    XClient.exe

  • Size

    165KB

  • Sample

    250302-zcw99svjx2

  • MD5

    4db38791024a474354f9ae3af4ed8104

  • SHA1

    2ec9da25252a6fc3c8c615863e1d0496e073baba

  • SHA256

    fb8d21ee3e971bb648b7f537304b480235d9090e09145df66e41d6ed6a6ce0ee

  • SHA512

    c313d6924cdadd96bcd3af8d7f648466505724fa638edc04b83380fbe1242435bc428e6f5fa28a6d0702d9398b3acf1d5b9f91b296b3c5c8b6cd7d4e35e88826

  • SSDEEP

    3072:tGpWRKt3Gqbtz/Ri7OujBBz65/M6If+3Js+3JFkKeTno:t4WRabxUbBxBt25

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/6EU9ps8S

Targets

    • Target

      XClient.exe

    • Size

      165KB

    • MD5

      4db38791024a474354f9ae3af4ed8104

    • SHA1

      2ec9da25252a6fc3c8c615863e1d0496e073baba

    • SHA256

      fb8d21ee3e971bb648b7f537304b480235d9090e09145df66e41d6ed6a6ce0ee

    • SHA512

      c313d6924cdadd96bcd3af8d7f648466505724fa638edc04b83380fbe1242435bc428e6f5fa28a6d0702d9398b3acf1d5b9f91b296b3c5c8b6cd7d4e35e88826

    • SSDEEP

      3072:tGpWRKt3Gqbtz/Ri7OujBBz65/M6If+3Js+3JFkKeTno:t4WRabxUbBxBt25

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks