Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Nexol.exe

  • Size

    448KB

  • Sample

    250309-pec93a1tbw

  • MD5

    69a831d62d8eb89c3327538d23ea3532

  • SHA1

    c0364914fffa90df86357489802599401b0712ec

  • SHA256

    eb050d5609042b0b8171889b6a34aadccab431c389e2d33a8e57afd332f69ac8

  • SHA512

    21c3ca6b26bad70dff7e8c6dd26cdf89d0e311bcb6315505fc7ba068625ba8b4452dcd9ba3c714f68de7de5ed369e27b25e82438ad66fb327f1839c34a2a3877

  • SSDEEP

    12288:tgmuiWCFstIScxuwu0iFsb9FYz6eEUFuYUgZ1jVDSFQx+:7uilFstIZMYiM923UgnDSFQx+

Malware Config

Extracted

Family

xworm

Version

3.1

Mutex

aC2Uqwxt1JZnqhmD

Attributes
  • Install_directory

    %Port%

  • install_file

    explorer.exe

  • pastebin_url

    https://pastebin.com/raw/jkeHBv0w

aes.plain

Targets

    • Target

      Nexol.exe

    • Size

      448KB

    • MD5

      69a831d62d8eb89c3327538d23ea3532

    • SHA1

      c0364914fffa90df86357489802599401b0712ec

    • SHA256

      eb050d5609042b0b8171889b6a34aadccab431c389e2d33a8e57afd332f69ac8

    • SHA512

      21c3ca6b26bad70dff7e8c6dd26cdf89d0e311bcb6315505fc7ba068625ba8b4452dcd9ba3c714f68de7de5ed369e27b25e82438ad66fb327f1839c34a2a3877

    • SSDEEP

      12288:tgmuiWCFstIScxuwu0iFsb9FYz6eEUFuYUgZ1jVDSFQx+:7uilFstIZMYiM923UgnDSFQx+

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks