General

  • Target

    XClient.exe

  • Size

    41KB

  • Sample

    240531-t9h61sed2v

  • MD5

    daa12fe7204ec7192ef9b295a1775e1a

  • SHA1

    b9627cbdea6c2317ee58a0020f3ad2e217d63ada

  • SHA256

    39140afbfa30b4817ff4c5e60bbaac3e87e68cf432bc52aa12f7af8c610bf721

  • SHA512

    f16e3967a6ac2db9193e234c9129115921afab8b7160a7f59cf8d88511485f49e211a7201e620a43df1764658f6c4e8733180fd94bea15a3539451baec1fd67c

  • SSDEEP

    768:xKr2/FPtKX7eRvIiWqyAuIzfjFSyratF5PG9sFOwh93ECO:xhe7EI3RAuwxSyruFI9sFOw/lO

Malware Config

Extracted

Family

xworm

Version

5.0

C2

panel-slave.gl.at.ply.gg:27892

Mutex

x5c9skCfROL5QJVg

Attributes
  • Install_directory

    %AppData%

  • install_file

    $77client.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      41KB

    • MD5

      daa12fe7204ec7192ef9b295a1775e1a

    • SHA1

      b9627cbdea6c2317ee58a0020f3ad2e217d63ada

    • SHA256

      39140afbfa30b4817ff4c5e60bbaac3e87e68cf432bc52aa12f7af8c610bf721

    • SHA512

      f16e3967a6ac2db9193e234c9129115921afab8b7160a7f59cf8d88511485f49e211a7201e620a43df1764658f6c4e8733180fd94bea15a3539451baec1fd67c

    • SSDEEP

      768:xKr2/FPtKX7eRvIiWqyAuIzfjFSyratF5PG9sFOwh93ECO:xhe7EI3RAuwxSyruFI9sFOw/lO

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks