General

  • Target

    roblox executor.exe

  • Size

    61KB

  • Sample

    241101-mre83szdqf

  • MD5

    68adc600ea667eb3f961aae6a255185d

  • SHA1

    1ac679eddab6dad6b96bc52e5ef63f510db2453e

  • SHA256

    deae8a2730c0fdf4cb2b2805621e48902c05647fc3882fc4a04d346b0a04ed93

  • SHA512

    337baf180e6779ec0c3ae01f89139629ec123e1963c61da063d3f019c2507de631a5416312d5978f74ce1c57d2c3ce8f528accea6f3b0deaaef569d23b1d54df

  • SSDEEP

    1536:WpK5NoIGud+hxXIvMf/dYUDbFqBjSBLYOebCK:W1/uchBPKUDbFT8OebT

Score
10/10

Malware Config

Extracted

Family

xworm

C2

thus-dh.gl.at.ply.gg:40949

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      roblox executor.exe

    • Size

      61KB

    • MD5

      68adc600ea667eb3f961aae6a255185d

    • SHA1

      1ac679eddab6dad6b96bc52e5ef63f510db2453e

    • SHA256

      deae8a2730c0fdf4cb2b2805621e48902c05647fc3882fc4a04d346b0a04ed93

    • SHA512

      337baf180e6779ec0c3ae01f89139629ec123e1963c61da063d3f019c2507de631a5416312d5978f74ce1c57d2c3ce8f528accea6f3b0deaaef569d23b1d54df

    • SSDEEP

      1536:WpK5NoIGud+hxXIvMf/dYUDbFqBjSBLYOebCK:W1/uchBPKUDbFT8OebT

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks