General

  • Target

    XClient.exe

  • Size

    196KB

  • Sample

    240408-m9xabafg34

  • MD5

    96de3d35b55091bb644b9527ce2b047b

  • SHA1

    a1d9bba9c99428f3eca980ea452bf32ac8d7e53f

  • SHA256

    2940d87d5a5b717fc168500f111019c9bf6bcf2b7fa3c45644801650cc5a7e16

  • SHA512

    6683e2e18ad8fc3f6ba17fe50d1c8ca86b62c358d034489c2dec9009ab64d8b7add21c9ffd14d5e6ff8d2a062f7942ad3d791540a7646a2e8840b71bf8f6c7e0

  • SSDEEP

    3072:aioGMSjWtbuLuwhLYvuiCOFMV+4NpVq8BxFRzaqF+o2GQJ7/JzqVfGvp:aXGMSkbNwhQPgVqwlL

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:80

https://6e1c-24-245-183-54.ngrok-free.app/:80

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      XClient.exe

    • Size

      196KB

    • MD5

      96de3d35b55091bb644b9527ce2b047b

    • SHA1

      a1d9bba9c99428f3eca980ea452bf32ac8d7e53f

    • SHA256

      2940d87d5a5b717fc168500f111019c9bf6bcf2b7fa3c45644801650cc5a7e16

    • SHA512

      6683e2e18ad8fc3f6ba17fe50d1c8ca86b62c358d034489c2dec9009ab64d8b7add21c9ffd14d5e6ff8d2a062f7942ad3d791540a7646a2e8840b71bf8f6c7e0

    • SSDEEP

      3072:aioGMSjWtbuLuwhLYvuiCOFMV+4NpVq8BxFRzaqF+o2GQJ7/JzqVfGvp:aXGMSkbNwhQPgVqwlL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks