General

  • Target

    XClient.exe

  • Size

    38KB

  • Sample

    240423-3k8vtach64

  • MD5

    8de16a101c26eb3def9de0a4c1ed92e6

  • SHA1

    73a697ba5553b46c7b24439eb29e1d208d9efb42

  • SHA256

    7f00e48b3dbd744ca6daf1f62bf29434ff89215ac8a01b9c89496c4a5f57bab0

  • SHA512

    c5fce2d9e68183cc3f2b8fb63dde45eaa8c0201927595b193cb754ed9aaa3d40319a0ae6a6e6d0d2f49fb8363b9d427dc297820c144c3cffd3d8041d256359dc

  • SSDEEP

    768:gjElHydACVE2rOnS7q1vFu1Fu96HOfhpDEi:h8B5CSGvF4Fu96HOfIi

Malware Config

Extracted

Family

xworm

Version

3.1

C2

h2cker.ddns.net:194

Mutex

JGTzs3YgAF2Db8Mc

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      38KB

    • MD5

      8de16a101c26eb3def9de0a4c1ed92e6

    • SHA1

      73a697ba5553b46c7b24439eb29e1d208d9efb42

    • SHA256

      7f00e48b3dbd744ca6daf1f62bf29434ff89215ac8a01b9c89496c4a5f57bab0

    • SHA512

      c5fce2d9e68183cc3f2b8fb63dde45eaa8c0201927595b193cb754ed9aaa3d40319a0ae6a6e6d0d2f49fb8363b9d427dc297820c144c3cffd3d8041d256359dc

    • SSDEEP

      768:gjElHydACVE2rOnS7q1vFu1Fu96HOfhpDEi:h8B5CSGvF4Fu96HOfIi

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks