General

  • Target

    XClient.exe

  • Size

    64KB

  • Sample

    240313-w5thascd3v

  • MD5

    6b5dcbc958ec4bd286b36cac206f52e7

  • SHA1

    fbd503615f93548b5f7bf9e0c498e7f964897b06

  • SHA256

    a318caa0331196506f789d44fb4fb8e36f92fed81b8d300903d745207d53aa5f

  • SHA512

    43a911deb277b3bacc7a149863493db70079e9654037b65bc419a416b5b607e2fa7229e5bebcb973ed46da236ae1fe91a41e3108b3bc00989a6fb93383796a1f

  • SSDEEP

    1536:M1uNf16pbkc51f1AHw7oB96R+bxoYuOsIrBz9FS3X:MUNfQdpOw73+bxWO9R0X

Malware Config

Extracted

Family

xworm

C2

140.238.91.110:80

104.28.195.39:80

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    svchost.exe

Targets

    • Target

      XClient.exe

    • Size

      64KB

    • MD5

      6b5dcbc958ec4bd286b36cac206f52e7

    • SHA1

      fbd503615f93548b5f7bf9e0c498e7f964897b06

    • SHA256

      a318caa0331196506f789d44fb4fb8e36f92fed81b8d300903d745207d53aa5f

    • SHA512

      43a911deb277b3bacc7a149863493db70079e9654037b65bc419a416b5b607e2fa7229e5bebcb973ed46da236ae1fe91a41e3108b3bc00989a6fb93383796a1f

    • SSDEEP

      1536:M1uNf16pbkc51f1AHw7oB96R+bxoYuOsIrBz9FS3X:MUNfQdpOw73+bxWO9R0X

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks