General

  • Target

    XClient.exe

  • Size

    80KB

  • Sample

    240506-xh7bbaec6y

  • MD5

    405e11878c0ac1386857c85209828c3d

  • SHA1

    96810cd21f1e2191f6b5eea68f94e44f500d59b2

  • SHA256

    b2997726b57ba65d527b4dcc576f33436079e2a2de33fa2fff16292ee84dce97

  • SHA512

    302645e490c3e4a9ef096e5a8ad954ef0ac2073e1d9be487b504568c4a5cafd20b21affa81ffe57cf762405d2fbe2fe2c898cd839b3b0b2fb6bc09ebe1244117

  • SSDEEP

    1536:aXWKwUakYVuF6qrV2aMSZaKw6t4bVUxM7m7c9G1OdH9EKPy:CWgpz2+ZXlebVUGm7NOddZy

Malware Config

Extracted

Family

xworm

C2

7.tcp.eu.ngrok.io:14199

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      XClient.exe

    • Size

      80KB

    • MD5

      405e11878c0ac1386857c85209828c3d

    • SHA1

      96810cd21f1e2191f6b5eea68f94e44f500d59b2

    • SHA256

      b2997726b57ba65d527b4dcc576f33436079e2a2de33fa2fff16292ee84dce97

    • SHA512

      302645e490c3e4a9ef096e5a8ad954ef0ac2073e1d9be487b504568c4a5cafd20b21affa81ffe57cf762405d2fbe2fe2c898cd839b3b0b2fb6bc09ebe1244117

    • SSDEEP

      1536:aXWKwUakYVuF6qrV2aMSZaKw6t4bVUxM7m7c9G1OdH9EKPy:CWgpz2+ZXlebVUGm7NOddZy

    • Detect Xworm Payload

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • ModiLoader Second Stage

    • Drops startup file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks