General

  • Target

    XClient.exe

  • Size

    45KB

  • Sample

    240428-ymm9nsga5v

  • MD5

    0307f42608513c36af121c84702682c5

  • SHA1

    181760ba80f4adf14191a3c50a9401a22c22b49b

  • SHA256

    e4d5387b673bb06e9aafd4d00ff9b1cc7ea7512cc7ff8285299756713331acf5

  • SHA512

    a115af4f40aad5f5ea4c9e4ba8355a372e2796ff71149567248f75841622af97581a9cd44761d3f6638095001f20117f9ee14d9833a12e66ea89752166a1f416

  • SSDEEP

    768:LIrdDFbRWXhadEUoSFPZAsTd6qOT7MFHFEPG9PyOChLzYuXbH:LgqhAfZAoVJF19PyOC5hXbH

Malware Config

Extracted

Family

xworm

Version

5.0

C2

green-morrison.gl.at.ply.gg:8080

Mutex

eNeoo75Bjv1LdL1j

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      45KB

    • MD5

      0307f42608513c36af121c84702682c5

    • SHA1

      181760ba80f4adf14191a3c50a9401a22c22b49b

    • SHA256

      e4d5387b673bb06e9aafd4d00ff9b1cc7ea7512cc7ff8285299756713331acf5

    • SHA512

      a115af4f40aad5f5ea4c9e4ba8355a372e2796ff71149567248f75841622af97581a9cd44761d3f6638095001f20117f9ee14d9833a12e66ea89752166a1f416

    • SSDEEP

      768:LIrdDFbRWXhadEUoSFPZAsTd6qOT7MFHFEPG9PyOChLzYuXbH:LgqhAfZAoVJF19PyOC5hXbH

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks