General

  • Target

    XClient.exe

  • Size

    74KB

  • Sample

    240420-n31vlagg7t

  • MD5

    d3ebbab144d54b4759acdf633ecbee16

  • SHA1

    fa2b167957e2aa8905d3af4f07f80967c819bdab

  • SHA256

    ee28f54f43c0bf06067ae14fd538a95de55eb811bab582291fa7688b2c50b46e

  • SHA512

    9095630280b3140edccf566346b5eb9b72026c772aa64c945d3cf136f51ccac097bd60e58694b41dc00961dfcb1be442f078eebc9d66f934e3436f72b5f5f9d3

  • SSDEEP

    1536:aAaGPPDda5jxH7iqWO3O9pdNb55zO6pyOdT2F6eWr9On6Cn9lAOk:kUbdmjxH7iA3IpDb5VpyK2rIO6S9l+

Malware Config

Extracted

Family

xworm

Version

3.1

C2

0.tcp.eu.ngrok.io:12979

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      XClient.exe

    • Size

      74KB

    • MD5

      d3ebbab144d54b4759acdf633ecbee16

    • SHA1

      fa2b167957e2aa8905d3af4f07f80967c819bdab

    • SHA256

      ee28f54f43c0bf06067ae14fd538a95de55eb811bab582291fa7688b2c50b46e

    • SHA512

      9095630280b3140edccf566346b5eb9b72026c772aa64c945d3cf136f51ccac097bd60e58694b41dc00961dfcb1be442f078eebc9d66f934e3436f72b5f5f9d3

    • SSDEEP

      1536:aAaGPPDda5jxH7iqWO3O9pdNb55zO6pyOdT2F6eWr9On6Cn9lAOk:kUbdmjxH7iA3IpDb5VpyK2rIO6S9l+

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks