General

  • Target

    XClient.exe

  • Size

    68KB

  • Sample

    250308-j57zgatqt9

  • MD5

    7211f73e408ec41e11fdbb85880d8c1e

  • SHA1

    6a8a1453153de5df5ce622cad3e0a174082763e5

  • SHA256

    57b3c6691f0c7cd0b001b6a2b1ff318cedc586ce042641b46befe3f4e5b9c765

  • SHA512

    de3d0978acfd451c060ebd4f9cb1591c12d554048b21dd2cbf9dbfc4391a44337abf800e44b953726168ad5389536d30d4ec19c38603df24d695ec90b3403aa9

  • SSDEEP

    1536:43JtaTWQlhe+u91ngXJseUcDw+bHab7gl56j3Om7KRv:45taTWqhe7TngXGDcDw+bHavglA3Om7S

Malware Config

Extracted

Family

xworm

C2

26.51.16.201:45737

Attributes
  • install_file

    client.exe

Targets

    • Target

      XClient.exe

    • Size

      68KB

    • MD5

      7211f73e408ec41e11fdbb85880d8c1e

    • SHA1

      6a8a1453153de5df5ce622cad3e0a174082763e5

    • SHA256

      57b3c6691f0c7cd0b001b6a2b1ff318cedc586ce042641b46befe3f4e5b9c765

    • SHA512

      de3d0978acfd451c060ebd4f9cb1591c12d554048b21dd2cbf9dbfc4391a44337abf800e44b953726168ad5389536d30d4ec19c38603df24d695ec90b3403aa9

    • SSDEEP

      1536:43JtaTWQlhe+u91ngXJseUcDw+bHab7gl56j3Om7KRv:45taTWqhe7TngXGDcDw+bHavglA3Om7S

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks