General

  • Target

    XClient.exe

  • Size

    85KB

  • Sample

    231125-dpvrbagb83

  • MD5

    476fb9414c66eedcc4265954a3e1aa99

  • SHA1

    ae0c919f0d0c4063c8be42e22f5062379bea6753

  • SHA256

    1d54baf0ba23696c0473f457c60b3291511a5598fdf63bbcd57b2aa22e121d0c

  • SHA512

    ca6a4b3ee81a861196b15d73a0a1a114d97ea1b0fc4de806bf25430d7865eed94319415a279db1631da8b52562283008362780f17853d7247ee7071893e7dd27

  • SSDEEP

    1536:SK6iiC2yVre55kDxABxJXKrpTnY9iZtb9xxYub6vfkXOrCW:SKH8G6dapTVtb9xMAOrF

Malware Config

Extracted

Family

xworm

C2

18.192.31.165:10715

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      XClient.exe

    • Size

      85KB

    • MD5

      476fb9414c66eedcc4265954a3e1aa99

    • SHA1

      ae0c919f0d0c4063c8be42e22f5062379bea6753

    • SHA256

      1d54baf0ba23696c0473f457c60b3291511a5598fdf63bbcd57b2aa22e121d0c

    • SHA512

      ca6a4b3ee81a861196b15d73a0a1a114d97ea1b0fc4de806bf25430d7865eed94319415a279db1631da8b52562283008362780f17853d7247ee7071893e7dd27

    • SSDEEP

      1536:SK6iiC2yVre55kDxABxJXKrpTnY9iZtb9xxYub6vfkXOrCW:SKH8G6dapTVtb9xMAOrF

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks