General

  • Target

    UCO5J_Excellent2.0.exe

  • Size

    77KB

  • Sample

    250304-qsvxpssjz8

  • MD5

    fa9dbd782dfb5bf2f278c4bc6a73279e

  • SHA1

    dc01ceae67b4983111677b421691903a6eba150b

  • SHA256

    40d127a2d334e18d6e80801667a5d1e356f8c8a142563e360ab4f15796737428

  • SHA512

    dc0a3c67ea86b7dba4016800ddb03c27cc87932fe9244658675c470c3cb8b41f6fb1d1fe87feaef60acc80d65de26ba3ea5e100382bfbdf9c8e6829c5c1c3c04

  • SSDEEP

    1536:rdxon/N6GtnKEc2wP8UiQksF+bVMp23aYkFDoPjPT6HMXkzf2YyjjmO82C3hk:gnF6GtnKTB0Ckk+bVMS9TXU+biO8x3hk

Malware Config

Extracted

Family

xworm

C2

africa-wins.gl.at.ply.gg:41663

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      UCO5J_Excellent2.0.exe

    • Size

      77KB

    • MD5

      fa9dbd782dfb5bf2f278c4bc6a73279e

    • SHA1

      dc01ceae67b4983111677b421691903a6eba150b

    • SHA256

      40d127a2d334e18d6e80801667a5d1e356f8c8a142563e360ab4f15796737428

    • SHA512

      dc0a3c67ea86b7dba4016800ddb03c27cc87932fe9244658675c470c3cb8b41f6fb1d1fe87feaef60acc80d65de26ba3ea5e100382bfbdf9c8e6829c5c1c3c04

    • SSDEEP

      1536:rdxon/N6GtnKEc2wP8UiQksF+bVMp23aYkFDoPjPT6HMXkzf2YyjjmO82C3hk:gnF6GtnKTB0Ckk+bVMS9TXU+biO8x3hk

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks