General

  • Target

    VNPT7_XClient.exe

  • Size

    67KB

  • Sample

    250304-vr1h1swnz8

  • MD5

    51c54850a03f6858fe61e195110f33d9

  • SHA1

    6e804a790b2b9a63f02d756a963fb76472d789cf

  • SHA256

    9ee2b4dfcae8b6e7681dc6691ffd4dcfb521d061188b805e4c09f4151bbb9674

  • SHA512

    642e969c5dc7165cf63dda7423ea42042878949909e860a73fabeb1bd9b2083fe026a705eb94be99fc68f691f4ca0a3ed820037afb2a35323e628b52941ec16c

  • SSDEEP

    1536:60UL9WC16LIK6u/VO2kbP8cnnSVzS06H3OCIDO495:HULOLXA2kbP8MO/C495

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    Sihost.exe

  • pastebin_url

    https://pastebin.com/raw/hA5YVNf1

Targets

    • Target

      VNPT7_XClient.exe

    • Size

      67KB

    • MD5

      51c54850a03f6858fe61e195110f33d9

    • SHA1

      6e804a790b2b9a63f02d756a963fb76472d789cf

    • SHA256

      9ee2b4dfcae8b6e7681dc6691ffd4dcfb521d061188b805e4c09f4151bbb9674

    • SHA512

      642e969c5dc7165cf63dda7423ea42042878949909e860a73fabeb1bd9b2083fe026a705eb94be99fc68f691f4ca0a3ed820037afb2a35323e628b52941ec16c

    • SSDEEP

      1536:60UL9WC16LIK6u/VO2kbP8cnnSVzS06H3OCIDO495:HULOLXA2kbP8MO/C495

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks