General

  • Target

    d8a4682081aafd15197b375cc0c943e2aedd6b07a227ea142bb0b5f34bedfc48

  • Size

    428KB

  • Sample

    250304-zvf11a1mz3

  • MD5

    a96147bbeb5ef1b2a125942c494725ca

  • SHA1

    f94fcab67111e2d597e543a06ebc32c8aa52c7d9

  • SHA256

    d8a4682081aafd15197b375cc0c943e2aedd6b07a227ea142bb0b5f34bedfc48

  • SHA512

    e912b92231326b0777dc4d025eb0d9d51e30261e8a8154f6251e9e1e2423cb1dd22903d0cbfb9283c9a39f04109453516bd7d0e85c8d8c757a1b9e2a7243fd57

  • SSDEEP

    1536:Aq6RXEC8huuhoQ/t2dFDnv+bGYw5xDb4SX26FOe9RcHrUkccckcccccE:R6RshuBQkvnv+bGYwwSXdO0RcLUk

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:28543

membership-enforcement.gl.at.ply.gg:28543

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      d8a4682081aafd15197b375cc0c943e2aedd6b07a227ea142bb0b5f34bedfc48

    • Size

      428KB

    • MD5

      a96147bbeb5ef1b2a125942c494725ca

    • SHA1

      f94fcab67111e2d597e543a06ebc32c8aa52c7d9

    • SHA256

      d8a4682081aafd15197b375cc0c943e2aedd6b07a227ea142bb0b5f34bedfc48

    • SHA512

      e912b92231326b0777dc4d025eb0d9d51e30261e8a8154f6251e9e1e2423cb1dd22903d0cbfb9283c9a39f04109453516bd7d0e85c8d8c757a1b9e2a7243fd57

    • SSDEEP

      1536:Aq6RXEC8huuhoQ/t2dFDnv+bGYw5xDb4SX26FOe9RcHrUkccckcccccE:R6RshuBQkvnv+bGYwwSXdO0RcLUk

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks