Resubmissions

21-05-2024 07:50

240521-jn78xade91 10

21-05-2024 07:45

240521-jlrs5sde3w 10

21-05-2024 07:45

240521-jlh61ade2y 10

21-05-2024 07:36

240521-jfksmsdb24 10

21-05-2024 07:23

240521-h8a88scg37 10

21-05-2024 07:17

240521-h4fcdsce85 10

General

  • Target

    XClient.exe

  • Size

    41KB

  • Sample

    240521-jfksmsdb24

  • MD5

    0658f349a11af82050212edf3f599342

  • SHA1

    0fa5f0818a7e50fd312f5dab4b7150de7df9fa7e

  • SHA256

    5da1772e67ac37571ed70b498e237cde750647607d4fe98fd8e7fd8668e0c0e0

  • SHA512

    0c337cf6b38a2e2c7078813c61086a173c5761f4b90efdbee85fd7edb4f16731d66a9ea95bc4988340b64e37d75b4227b224a110bb0e64fc36e076511857c3f7

  • SSDEEP

    768:TKr2/FPtKX7eRvIiWqyAuIzfjFSuDatF5PG9sJOwhU3ECN:The7EI3RAuwxSuDuFI9sJOwGlN

Malware Config

Extracted

Family

xworm

Version

5.0

C2

panel-slave.gl.at.ply.gg:57059

Mutex

kdrfWObdXWjh7iBF

Attributes
  • Install_directory

    %AppData%

  • install_file

    $77client.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      41KB

    • MD5

      0658f349a11af82050212edf3f599342

    • SHA1

      0fa5f0818a7e50fd312f5dab4b7150de7df9fa7e

    • SHA256

      5da1772e67ac37571ed70b498e237cde750647607d4fe98fd8e7fd8668e0c0e0

    • SHA512

      0c337cf6b38a2e2c7078813c61086a173c5761f4b90efdbee85fd7edb4f16731d66a9ea95bc4988340b64e37d75b4227b224a110bb0e64fc36e076511857c3f7

    • SSDEEP

      768:TKr2/FPtKX7eRvIiWqyAuIzfjFSuDatF5PG9sJOwhU3ECN:The7EI3RAuwxSuDuFI9sJOwGlN

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks