General

  • Target

    XClient.exe

  • Size

    86KB

  • Sample

    240311-v7c3nabf63

  • MD5

    2473c3e8b3d22cbfaa9b5d8115f6166b

  • SHA1

    71e87a094f3e4686839bcc073ae9b0ac7a371ebf

  • SHA256

    3d812652bff62c3321446e5591acb27f2b40e4d42872c3629588bfc2ac31151b

  • SHA512

    51ea5719bfac698f029cd02f74384ec2d88cd7bec858c4fcb5887cb31488f9aea387ee5d057dc6efb2940ef56bd0bc423d9771d6ddb7436644ada94a35f556d2

  • SSDEEP

    1536:M5EkmroQStrBcx9B4YD8yto0En9bBAbFAJxxo96uODf6JT+zo:0ErqWR4k8ytoLn9b8ASO7WUo

Malware Config

Extracted

Family

xworm

C2

story-pl.gl.at.ply.gg:13978

Attributes
  • Install_directory

    %Temp%

  • install_file

    MicrosoftAudioDriver.exe

Targets

    • Target

      XClient.exe

    • Size

      86KB

    • MD5

      2473c3e8b3d22cbfaa9b5d8115f6166b

    • SHA1

      71e87a094f3e4686839bcc073ae9b0ac7a371ebf

    • SHA256

      3d812652bff62c3321446e5591acb27f2b40e4d42872c3629588bfc2ac31151b

    • SHA512

      51ea5719bfac698f029cd02f74384ec2d88cd7bec858c4fcb5887cb31488f9aea387ee5d057dc6efb2940ef56bd0bc423d9771d6ddb7436644ada94a35f556d2

    • SSDEEP

      1536:M5EkmroQStrBcx9B4YD8yto0En9bBAbFAJxxo96uODf6JT+zo:0ErqWR4k8ytoLn9b8ASO7WUo

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks