General

  • Target

    XClient.exe

  • Size

    136KB

  • Sample

    240218-jmz6xafe7x

  • MD5

    d02127c12495b6295f74bdd2a1c06da0

  • SHA1

    c6bccc80a5ca3d2a803e1df5163343042266700a

  • SHA256

    e4604c8555fd9ac08b00a5c51795657b9a339fa07ef5e6c64e9f54fe79d28b42

  • SHA512

    c0b1a266ed3d6327aa827b0ed430f75bfd9a38642688e9fa231ace5d98556fb7e7d0705000f7391b57e2d9334961fffc7cc3759f05af3ce7c18424da05de5fb9

  • SSDEEP

    768:6DZXbbMjFrGU/VHPa7N/ZFY9ybOjhI/R4Eo0jaf6mFSyT5rp7:6DZXbqFaU/VHynFY9ybOjuJ4ERafjV7

Malware Config

Extracted

Family

xworm

Version

3.0

C2

147.185.221.17:65030

Mutex

67tPpoR2GxMoXLhl

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      136KB

    • MD5

      d02127c12495b6295f74bdd2a1c06da0

    • SHA1

      c6bccc80a5ca3d2a803e1df5163343042266700a

    • SHA256

      e4604c8555fd9ac08b00a5c51795657b9a339fa07ef5e6c64e9f54fe79d28b42

    • SHA512

      c0b1a266ed3d6327aa827b0ed430f75bfd9a38642688e9fa231ace5d98556fb7e7d0705000f7391b57e2d9334961fffc7cc3759f05af3ce7c18424da05de5fb9

    • SSDEEP

      768:6DZXbbMjFrGU/VHPa7N/ZFY9ybOjhI/R4Eo0jaf6mFSyT5rp7:6DZXbqFaU/VHynFY9ybOjuJ4ERafjV7

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks