General

  • Target

    XClient.exe

  • Size

    33KB

  • Sample

    241014-y659laydnj

  • MD5

    eb7b80a5a42b92b23767a46f705b169f

  • SHA1

    4fc59c5b5f4b1e729704002f5221cd5caa903b57

  • SHA256

    92ca915aef101551669d873a2e3c2c3c7f5d5b97c8d5c5b5d7ab1077cab93861

  • SHA512

    aa6b2aea70bec6271e05368f4dd4b50b649697df4407475f12f8d2df5dd9fe7c0aff3c35d3d100b06d84d68f16399433eac67f2912f43256386ddfab25a7497e

  • SSDEEP

    768:QB3hXuukvIi2lahqLeqdXFh9ZLO/hA/E3v:G3Euo32lahlqtFh9ZLO/+c/

Malware Config

Extracted

Family

xworm

Version

3.1

Mutex

Km23iY6beYgshSJV

Attributes
  • Install_directory

    %Public%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/J09JweeH

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      33KB

    • MD5

      eb7b80a5a42b92b23767a46f705b169f

    • SHA1

      4fc59c5b5f4b1e729704002f5221cd5caa903b57

    • SHA256

      92ca915aef101551669d873a2e3c2c3c7f5d5b97c8d5c5b5d7ab1077cab93861

    • SHA512

      aa6b2aea70bec6271e05368f4dd4b50b649697df4407475f12f8d2df5dd9fe7c0aff3c35d3d100b06d84d68f16399433eac67f2912f43256386ddfab25a7497e

    • SSDEEP

      768:QB3hXuukvIi2lahqLeqdXFh9ZLO/hA/E3v:G3Euo32lahlqtFh9ZLO/+c/

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks