{"id":6228,"date":"2023-11-21T06:01:19","date_gmt":"2023-11-21T06:01:19","guid":{"rendered":"\/cybersecurity-blog\/?p=6228"},"modified":"2023-11-29T13:31:04","modified_gmt":"2023-11-29T13:31:04","slug":"xworm-malware-communication-analysis","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/","title":{"rendered":"XWorm Malware: Exploring C&#038;C Communication"},"content":{"rendered":"\n<p>In this article, our guest author Igal Lytzki (<a href=\"https:\/\/twitter.com\/0xToxin\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">0xToxin<\/a> on Twitter) will explore and understand the dynamics occurring when a successful connection is established between the XWorm operating server and a user who has fallen victim to executing this malware.&nbsp;<\/p>\n\n\n\n<p>Throughout this article, Igal will investigate the encryption of the communication between the client and the server, uncover the methods to decrypt it, and identify the potential data and commands the server can transmit to the client.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s get started!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is XWorm malware?&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/malware-trends\/xworm\" target=\"_blank\" rel=\"noreferrer noopener\">XWorm<\/a> is a Remote Access Trojan (RAT) malware, specifically targeting Windows operating systems. It provides the operator with an extensive array of so-called \u201cplugins\u201d designed to infect users upon successful connection.&nbsp;<\/p>\n\n\n\n<p>This malware has been active for quite a while now, a fact reflected in <a href=\"https:\/\/any.run\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=xworm_communication&amp;utm_content=linktolanding&amp;utm_term=211123\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>\u2019s weekly upload analytics they share on twitter:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-671x1024.webp\" alt=\"\" class=\"wp-image-6230\" width=\"472\" height=\"720\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-671x1024.webp 671w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-197x300.webp 197w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-768x1171.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-1007x1536.webp 1007w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-370x564.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-270x412.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-740x1129.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1.webp 1200w\" sizes=\"(max-width: 472px) 100vw, 472px\" \/><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/twitter.com\/anyrun_app\/status\/1706184083577983354\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/ANY.RUN_app\/status\/1706184083577983354<\/a>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">XWorm Initial Connection&nbsp;<\/h2>\n\n\n\n<p>As previously noted, the purpose of this article is an examination of the occurrences post-establishment of a new connection by the XWorm operating server.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For those seeking a deep understanding of the XWorm code, such as persistence techniques and configuration extraction, read this <a href=\"https:\/\/any.run\/cybersecurity-blog\/xworm-technical-analysis-of-a-new-malware-version\/\" target=\"_blank\" rel=\"noreferrer noopener\">detailed XWorm technical analysis in ANY.RUN\u2019s blog<\/a>.&nbsp;<\/p>\n\n\n\n<p>The current article is based on this <a href=\"https:\/\/app.any.run\/tasks\/1307e28e-f968-4ea0-85e5-ef31a1f6b733\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=xworm_communication&amp;utm_content=linktoservice&amp;utm_term=211123\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN analysis<\/a>. Feel free to join us in real-time analysis by filtering with the Process <strong>ID 2932<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"382\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img2-1024x382.webp\" alt=\"\" class=\"wp-image-6231\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img2-1024x382.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img2-300x112.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img2-768x287.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img2-1536x574.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img2-370x138.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img2-270x101.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img2-740x276.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img2.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">We\u2019ll focus on a process with ID 2932&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Analyzing the code of the XWorm payload, a specific class surfaces as the chief handler of the communication process with the server, termed the <strong>ClientSocket<\/strong> class in our context:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1004\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img3-1024x1004.webp\" alt=\"\" class=\"wp-image-6232\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img3-1024x1004.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img3-300x294.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img3-768x753.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img3-1536x1505.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img3-70x70.webp 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img3-370x363.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img3-270x265.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img3-740x725.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img3.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">ClientSocket class interface detailing server communication methods in XWorm payload&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>On its initial run on the victim&#8217;s computer, XWorm initiates a connection to a remote server, the details of which are located in the <strong>MalConf<\/strong> section on the ANY.RUN scan:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"392\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img4-1024x392.webp\" alt=\"\" class=\"wp-image-6233\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img4-1024x392.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img4-300x115.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img4-768x294.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img4-1536x588.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img4-370x142.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img4-270x103.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img4-740x283.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img4.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">XWorm malware configuration in ANY.RUN&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The transmitted communication data appears as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"613\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img5-1024x613.webp\" alt=\"\" class=\"wp-image-6234\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img5-1024x613.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img5-300x180.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img5-768x460.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img5-1536x920.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img5-370x222.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img5-270x162.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img5-740x443.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img5.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Transmitted communication data&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Examining the code reveals that it can be splitted into two principal segments:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>The data length (initial byte sequence up to the 0x00 byte)&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>The encrypted data&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Illustrated in the above scenario, the data length stands at <strong>272<\/strong> (expressed in decimal value).&nbsp;<\/p>\n\n\n\n<p>The encryption employed is AES-ECB (without padding), and the encryption key is the MD5 hash of a configuration variable decrypted during the malware\u2019s execution. In our case it\u2019s &lt;Guage12>.\u00a0<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\"> \nANY.RUN Enterprise plan at a discount\n<br>\nUse promo:<span class=\"highlight\"> SANDBOXSAVER<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/calendly.com\/svasiliev\/\" rel=\"noopener\" target=\"_blank\">\nBook a call\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Decrypting the data XWorm transmits to the server&nbsp;<\/h2>\n\n\n\n<p>Equipped with this, we can hash the key and attempt to decrypt the data transmitted to the server:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"179\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img6-1024x179.webp\" alt=\"\" class=\"wp-image-6235\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img6-1024x179.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img6-300x53.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img6-768x134.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img6-1536x269.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img6-370x65.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img6-270x47.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img6-740x130.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img6.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">A script to decrypt the communication&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>A script to decrypt the communication can be accessed <a href=\"https:\/\/gist.github.com\/0xToxin\/01a35dfc5edcd9d6885f6185ca9b4c4e\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.&nbsp;<\/p>\n\n\n\n<p>We can see that the first batch of data sent to the server has several fields. These can be split by using the splitter, found under the <strong>MalConf<\/strong> section. By comparing this with the malware\u2019s code, we can understand what each field represents:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ID<\/strong>: This is the MD5 hash of the following values strung together:&nbsp;&nbsp;<\/li>\n\n\n\n<li>Processor Count&nbsp;\n<ul class=\"wp-block-list\">\n<li>UserName&nbsp;<\/li>\n\n\n\n<li>MachineName&nbsp;<\/li>\n\n\n\n<li>OS Version&nbsp;<\/li>\n\n\n\n<li>Total size of C: drive&nbsp;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>UserName<\/strong>: The user\u2019s identifier.&nbsp;<\/li>\n\n\n\n<li><strong>OS<\/strong>: Information about the Operating System.&nbsp;<\/li>\n\n\n\n<li><strong>Version<\/strong>: Details about the version.&nbsp;<\/li>\n\n\n\n<li><strong>Last Write Time to the Executable<\/strong>: Shows the last time the executable file was changed.&nbsp;<\/li>\n\n\n\n<li><strong>Execution from Persistence<\/strong>: Shows if it ran from persistence.&nbsp;<\/li>\n\n\n\n<li><strong>Admin Status<\/strong>: Shows if it is running with administrative privileges.&nbsp;<\/li>\n\n\n\n<li><strong>Camera Check<\/strong>: Checks for a camera\u2019s presence.&nbsp;<\/li>\n\n\n\n<li><strong>CPU Info<\/strong>: Provides information about the Central Processing Unit.&nbsp;<\/li>\n\n\n\n<li><strong>GPU Info<\/strong>: Provides details about the Graphics Processing Unit.&nbsp;<\/li>\n\n\n\n<li><strong>RAM Info<\/strong>: Provides information on available Random Access Memory.&nbsp;<\/li>\n\n\n\n<li><strong>AV\u2019s Info<\/strong>: Provides details about installed antivirus software.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>After the necessary information has been sent to the XWorm server and the client is added to the infection panel, the attacker can use a wide range of plugins on the client.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Info Stealer Plugin&nbsp;<\/h2>\n\n\n\n<p>Examining the code structure of the XWorm binary, which was injected and operated under RegAsm.exe (PID 2932), reveals that it operates through the invocation of seven main classes during its execution:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AlgorithmAES<\/strong>: Responsible for decrypting data.&nbsp;<\/li>\n\n\n\n<li><strong>ClientSocket<\/strong>: Manages the establishment of connections to the remote server.&nbsp;<\/li>\n\n\n\n<li><strong>Helper<\/strong>: A class populated with numerous functions invoked by other classes.&nbsp;<\/li>\n\n\n\n<li><strong>Messages<\/strong>: Handles data received from the server, including the execution of plugins.&nbsp;<\/li>\n\n\n\n<li><strong>Xlogger<\/strong>: Serves as the keylogger function.&nbsp;<\/li>\n\n\n\n<li><strong>Uninstaller<\/strong>: Facilitates the uninstallation of the binary.&nbsp;<\/li>\n\n\n\n<li><strong>Main.<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Each of these classes plays a significant role in the operation and execution of the malware, collectively allowing it to function efficiently and achieve its malicious objectives.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img7-1024x585.webp\" alt=\"\" class=\"wp-image-6236\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img7-1024x585.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img7-300x171.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img7-768x439.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img7-1536x877.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img7-370x211.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img7-270x154.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img7-740x423.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img7.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">A list of classes. Each plays a significant role in execution of the malware&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>When examining the traffic between the client and the server, an unusually large packet being transmitted from the server to the client becomes evident:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"370\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img8-1024x370.webp\" alt=\"\" class=\"wp-image-6237\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img8-1024x370.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img8-300x108.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img8-768x277.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img8-1536x554.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img8-370x134.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img8-270x97.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img8-740x267.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img8.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Snapshot of large data packet transfer in client-server traffic analysis<\/figcaption><\/figure><\/div>\n\n\n<p>Upon downloading and decrypting this packet, it is revealed that the received command is to store a plugin. This plugin is stored as a .gz archive which, once uncompressed, unveils an executable:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"361\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img9-1024x361.webp\" alt=\"\" class=\"wp-image-6238\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img9-1024x361.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img9-300x106.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img9-768x271.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img9-1536x542.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img9-370x131.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img9-270x95.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img9-740x261.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img9.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Decryption of a .gz archive plugin command in malware payload analysis<\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"481\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img10-1024x481.webp\" alt=\"\" class=\"wp-image-6239\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img10-1024x481.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img10-300x141.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img10-768x361.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img10-1536x722.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img10-370x174.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img10-270x127.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img10-740x348.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img10.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Properties of a .NET DLL revealing its info-stealing capabilities post-decompression<\/figcaption><\/figure><\/div>\n\n\n<p>This executable is a .NET based DLL. A closer inspection of the code discloses that this DLL is an extensive infostealer, endowed with several theft capabilities such as:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Capturing Credit Card Information&nbsp;<\/li>\n\n\n\n<li>Harvesting Chromium Cookies&nbsp;<\/li>\n\n\n\n<li>Acquiring Discord Tokens&nbsp;<\/li>\n\n\n\n<li>Extracting FileZilla Credentials&nbsp;<\/li>\n\n\n\n<li>Accessing Browser Data&nbsp;<\/li>\n\n\n\n<li>Collecting Browser History&nbsp;<\/li>\n\n\n\n<li>Retrieving WiFi Passwords&nbsp;<\/li>\n\n\n\n<li>Compromising MetaMask&nbsp;<\/li>\n\n\n\n<li>Compromising Telegram&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>and more.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img11-564x1024.webp\" alt=\"\" class=\"wp-image-6240\" width=\"429\" height=\"778\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img11-564x1024.webp 564w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img11-165x300.webp 165w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img11-768x1395.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img11-370x672.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img11-270x491.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img11-scaled.webp 1409w\" sizes=\"(max-width: 429px) 100vw, 429px\" \/><figcaption class=\"wp-element-caption\">Class list from Recovery DLL showcasing various data extraction functions&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Commands Plugin&nbsp;<\/h2>\n\n\n\n<p>Continuing our examination of the traffic between the client and the server, we identify another packet of interest(smaller than the previous one but still unusual) that warrants a closer look:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"474\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img12-1024x474.webp\" alt=\"\" class=\"wp-image-6241\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img12-1024x474.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img12-300x139.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img12-768x355.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img12-1536x710.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img12-370x171.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img12-270x125.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img12-740x342.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img12.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Data packet capture highlighting another notable command plugin in network traffic analysis.&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>By applying the same decryption and uncompression processes, we uncover another executable:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"487\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img13-1024x487.webp\" alt=\"\" class=\"wp-image-6242\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img13-1024x487.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img13-300x143.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img13-768x365.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img13-1536x730.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img13-370x176.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img13-270x128.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img13-740x352.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img13.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Decryption output revealing executable code<\/figcaption><\/figure><\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"498\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img14-1024x498.webp\" alt=\"\" class=\"wp-image-6243\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img14-1024x498.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img14-300x146.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img14-768x373.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img14-1536x746.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img14-370x180.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img14-270x131.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img14-740x360.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img14.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Details of a .NET DLL with potential to execute various malicious actions<\/figcaption><\/figure><\/div>\n\n\n<p>This is another .NET based DLL, which suggests a range of potential actions that the adversary might want to execute:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Disabling or terminating Windows Defender.&nbsp;<\/li>\n\n\n\n<li>Excluding a path from Windows Defender scans.&nbsp;<\/li>\n\n\n\n<li>Installing the .NET framework.&nbsp;<\/li>\n\n\n\n<li>Blanking the screen.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>And more.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img15-945x1024.webp\" alt=\"\" class=\"wp-image-6244\" width=\"554\" height=\"600\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img15-945x1024.webp 945w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img15-277x300.webp 277w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img15-768x832.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img15-1418x1536.webp 1418w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img15-1890x2048.webp 1890w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img15-370x401.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img15-270x293.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img15-740x802.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img15.webp 2000w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><figcaption class=\"wp-element-caption\">Options.dll functions revealing malicious capabilities including screen blanking and system disruption&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Reviewing the Threats section in the ANY.RUN analysis, it is noted that numerous malicious activities were detected during the malware&#8217;s execution, including the identification of XWorm\u2019s request commands for <strong>sendPlugin<\/strong> and <strong>savePlugin<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"291\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img16-1024x291.webp\" alt=\"\" class=\"wp-image-6245\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img16-1024x291.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img16-300x85.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img16-768x218.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img16-1536x437.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img16-370x105.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img16-270x77.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img16-740x211.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img16.webp 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Command and control activity with sendPlugin and savePlugin requests in ANY.RUN<\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>IOCs<\/strong><\/h2>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-39\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"2\"\n           data-rows=\"4\"\n           data-wpID=\"39\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell wpdt-bold wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:16.155088852989%;                    padding:10px;\n                    \"\n                    >\n                                        FileName\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold wpdt-align-left\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:83.844911147011%;                    padding:10px;\n                    \"\n                    >\n                                        SHA256\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        msbuilds.exe\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        f58193da4f61b45e375f5aa2978b08908578b5151dc779dc4b566e6a941e802b\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Recovery.dll\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0ee68c8008e2a8d6252db3d3b1a1b0179e1f868b0b3240bbcec3d1c29d5364fb\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Options.dll\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        7df14d2929a500eec6a144ec8e687960bbea047f9a78a46ea64faa1fa28f8724\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-39'>\ntable#wpdtSimpleTable-39{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-39 td, table.wpdtSimpleTable39 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<h2 class=\"wp-block-heading\"><strong>MITRE ATT&amp;CK<\/strong><\/h2>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-40\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"2\"\n           data-rows=\"13\"\n           data-wpID=\"40\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell wpdt-bold wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        Tactic\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold wpdt-align-left\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        Technique\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        COLLECTION\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Archive Collected Data::Archive via Library T1560.002\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CREDENTIAL ACCESS\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Credentials from Password Stores::Credentials from Web Browsers T1555.003\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        DEFENSE EVASION\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Deobfuscate\/Decode Files or Information T1140\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        DEFENSE EVASION\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Obfuscated Files or Information T1027\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        DEFENSE EVASION\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Reflective Code Loading T1620\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A7\"\n                    data-col-index=\"0\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        DISCOVERY\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B7\"\n                    data-col-index=\"1\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        File and Directory Discovery T1083\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A8\"\n                    data-col-index=\"0\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        DISCOVERY\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B8\"\n                    data-col-index=\"1\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Process Discovery T1057\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A9\"\n                    data-col-index=\"0\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        DISCOVERY\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B9\"\n                    data-col-index=\"1\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Query Registry T1012\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A10\"\n                    data-col-index=\"0\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        DISCOVERY\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B10\"\n                    data-col-index=\"1\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        System Information Discovery T1082\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A11\"\n                    data-col-index=\"0\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        DISCOVERY\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B11\"\n                    data-col-index=\"1\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        System Location Discovery T1614\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A12\"\n                    data-col-index=\"0\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        EXECUTION\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B12\"\n                    data-col-index=\"1\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Shared Modules T1129\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A13\"\n                    data-col-index=\"0\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        EXECUTION\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B13\"\n                    data-col-index=\"1\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Windows Management Instrumentation T1047\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-40'>\ntable#wpdtSimpleTable-40{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-40 td, table.wpdtSimpleTable40 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<h2 class=\"wp-block-heading\"><strong>C2<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>140.228.29[.]162:7900&nbsp;<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In this article, our guest author Igal Lytzki (0xToxin on Twitter) will explore and understand the dynamics occurring when a successful connection is established between the XWorm operating server and a user who has fallen victim to executing this malware.&nbsp; Throughout this article, Igal will investigate the encryption of the communication between the client and [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6254,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,34,40],"class_list":["post-6228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>XWorm Malware: Exploring C&amp;C Communication - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Explore XWorm&#039;s communication encryption, uncover decryption methods, and see the data and commands the malware transmits.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Lytzki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/\"},\"author\":{\"name\":\"Igal Lytzki\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"XWorm Malware: Exploring C&#038;C Communication\",\"datePublished\":\"2023-11-21T06:01:19+00:00\",\"dateModified\":\"2023-11-29T13:31:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/\"},\"wordCount\":1191,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/\",\"name\":\"XWorm Malware: Exploring C&C Communication - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-11-21T06:01:19+00:00\",\"dateModified\":\"2023-11-29T13:31:04+00:00\",\"description\":\"Explore XWorm's communication encryption, uncover decryption methods, and see the data and commands the malware transmits.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"XWorm Malware: Exploring C&#038;C Communication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Igal Lytzki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/image-35.png\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/image-35.png\",\"caption\":\"Igal Lytzki\"},\"description\":\"Threat Analyst & team leader. Malware researcher in my spare time.\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XWorm Malware: Exploring C&C Communication - ANY.RUN&#039;s Cybersecurity Blog","description":"Explore XWorm's communication encryption, uncover decryption methods, and see the data and commands the malware transmits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/","twitter_misc":{"Written by":"Igal Lytzki","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/"},"author":{"name":"Igal Lytzki","@id":"https:\/\/any.run\/"},"headline":"XWorm Malware: Exploring C&#038;C Communication","datePublished":"2023-11-21T06:01:19+00:00","dateModified":"2023-11-29T13:31:04+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/"},"wordCount":1191,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/","url":"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/","name":"XWorm Malware: Exploring C&C Communication - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-11-21T06:01:19+00:00","dateModified":"2023-11-29T13:31:04+00:00","description":"Explore XWorm's communication encryption, uncover decryption methods, and see the data and commands the malware transmits.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/xworm-malware-communication-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"XWorm Malware: Exploring C&#038;C Communication"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Igal Lytzki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/image-35.png","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/image-35.png","caption":"Igal Lytzki"},"description":"Threat Analyst & team leader. Malware researcher in my spare time.","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6228"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=6228"}],"version-history":[{"count":12,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6228\/revisions"}],"predecessor-version":[{"id":6367,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6228\/revisions\/6367"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/6254"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=6228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=6228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=6228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}