General

  • Target

    XClient.exe

  • Size

    197KB

  • Sample

    240720-lv3m4szhjf

  • MD5

    e6e7c59619050009707b1a3e5bd7b4f8

  • SHA1

    3d3793934b589ef9de95967379c218e9028ffd4a

  • SHA256

    07bc245b9b7557d86cbd14137804ff829dd68a5766c3fb562b28c459376f2cd1

  • SHA512

    d4a686f304d62603c74cf54100a4a5f18e7793f888ebcb18170e76acf353ed40003cab3a3f8077027b4445954421fe6f68fbbdfb1b1e7ceeeab11c30be4c1402

  • SSDEEP

    3072:Vd9K/pFE9jxOj98SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLnK:V8E9gUhcX7elbKTuq9bfF/H9d9n

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

0.tcp.eu.ngrok.io:19399

Mutex

cjYvNhdTjl2KYJZg

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      197KB

    • MD5

      e6e7c59619050009707b1a3e5bd7b4f8

    • SHA1

      3d3793934b589ef9de95967379c218e9028ffd4a

    • SHA256

      07bc245b9b7557d86cbd14137804ff829dd68a5766c3fb562b28c459376f2cd1

    • SHA512

      d4a686f304d62603c74cf54100a4a5f18e7793f888ebcb18170e76acf353ed40003cab3a3f8077027b4445954421fe6f68fbbdfb1b1e7ceeeab11c30be4c1402

    • SSDEEP

      3072:Vd9K/pFE9jxOj98SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLnK:V8E9gUhcX7elbKTuq9bfF/H9d9n

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks