General

  • Target

    XClient.exe

  • Size

    35KB

  • Sample

    241103-apq7casnej

  • MD5

    9a2caad126990a0f16658a2ff1646157

  • SHA1

    5d851c31aad1f79c3ebcdfd5e0293b402c2a48cb

  • SHA256

    27110993bd53e38b26312d13c98b00b8b8e6447fb2726487638623e7214370ee

  • SHA512

    514045535434ff6f9cad8451c6e0dd16c1a09fce14b58312633d8030d672863d2d448bae5a0b17074010105b25bf07fe7b975bf266dc76ce74aaab95a916adde

  • SSDEEP

    768:9DMfF7zLKYs2Byj5MuddqLa9Fk9wEO/h0/q2z:9kF7HKYs/1hdtFk9wEO/6C2z

Malware Config

Extracted

Family

xworm

Version

5.0

C2

ensure-manual.gl.at.ply.gg:9321

Mutex

wwFuwDiBzpVl21Sl

Attributes
  • Install_directory

    %AppData%

  • install_file

    dllhost.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      35KB

    • MD5

      9a2caad126990a0f16658a2ff1646157

    • SHA1

      5d851c31aad1f79c3ebcdfd5e0293b402c2a48cb

    • SHA256

      27110993bd53e38b26312d13c98b00b8b8e6447fb2726487638623e7214370ee

    • SHA512

      514045535434ff6f9cad8451c6e0dd16c1a09fce14b58312633d8030d672863d2d448bae5a0b17074010105b25bf07fe7b975bf266dc76ce74aaab95a916adde

    • SSDEEP

      768:9DMfF7zLKYs2Byj5MuddqLa9Fk9wEO/h0/q2z:9kF7HKYs/1hdtFk9wEO/6C2z

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks