General

  • Target

    XClient.exe

  • Size

    68KB

  • Sample

    240627-pf7v3a1ckh

  • MD5

    47e0ca7830921cb0ba435b23785a9f86

  • SHA1

    7998df6ffc55c953a920f2e4b771c9332b3334f4

  • SHA256

    913e4250a41ad60478f4626a8e630f187dd454a62449fe5d690589045a58066d

  • SHA512

    c8a7ae5f64b4461d434f8aa0afbcd350485bd5b98731b717c54db57195b2bad850e47bc9ab34d6c4754fb9676c666492d5166cc643e11b4bf6a8022540aa0871

  • SSDEEP

    1536:UsiUknoCUAcE+PVCHb4hlaLS52IxUPBOr4vFFRF0Ri:UYeUAczPVCHb4gY2IcBOkFFwi

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7110

192.168.1.17:7110

Attributes
  • Install_directory

    %AppData%

  • install_file

    Window corporation.exe

Targets

    • Target

      XClient.exe

    • Size

      68KB

    • MD5

      47e0ca7830921cb0ba435b23785a9f86

    • SHA1

      7998df6ffc55c953a920f2e4b771c9332b3334f4

    • SHA256

      913e4250a41ad60478f4626a8e630f187dd454a62449fe5d690589045a58066d

    • SHA512

      c8a7ae5f64b4461d434f8aa0afbcd350485bd5b98731b717c54db57195b2bad850e47bc9ab34d6c4754fb9676c666492d5166cc643e11b4bf6a8022540aa0871

    • SSDEEP

      1536:UsiUknoCUAcE+PVCHb4hlaLS52IxUPBOr4vFFRF0Ri:UYeUAczPVCHb4gY2IcBOkFFwi

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks