General

  • Target

    XClients.exe

  • Size

    45KB

  • Sample

    240428-ysm6vsgb81

  • MD5

    f7c55ea427dd0cfd2201561f9f7a811e

  • SHA1

    2aa3099cb617791b717f4fd6222714d11eedca02

  • SHA256

    bbfce2443e1b8c98b10893da40cc0a8e13fef744a0e2ff06a8a714f2da40f5fe

  • SHA512

    d3c637b854a60e8ea0567c30c8c3d8aa537d892224f36892d5e5d36d3ff41f1135d14c4030adbadc6d57884306b4ac6bb66f5d2300994af0cbb12ee6c1d728b9

  • SSDEEP

    768:LFIrdDFbRWXhadEUoSFPZAsTdLqOT7MFHFEPG9PqOChgzYuXbE:LFgqhAfZAoWJF19PqOCqhXbE

Malware Config

Extracted

Family

xworm

Version

5.0

C2

green-morrison.gl.at.ply.gg:17455

Mutex

k3DGBvQQ1dUQrhbN

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      XClients.exe

    • Size

      45KB

    • MD5

      f7c55ea427dd0cfd2201561f9f7a811e

    • SHA1

      2aa3099cb617791b717f4fd6222714d11eedca02

    • SHA256

      bbfce2443e1b8c98b10893da40cc0a8e13fef744a0e2ff06a8a714f2da40f5fe

    • SHA512

      d3c637b854a60e8ea0567c30c8c3d8aa537d892224f36892d5e5d36d3ff41f1135d14c4030adbadc6d57884306b4ac6bb66f5d2300994af0cbb12ee6c1d728b9

    • SSDEEP

      768:LFIrdDFbRWXhadEUoSFPZAsTdLqOT7MFHFEPG9PqOChgzYuXbE:LFgqhAfZAoWJF19PqOCqhXbE

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks