General

  • Target

    xwo.exe

  • Size

    189KB

  • Sample

    241105-tws43axjgq

  • MD5

    7949220a0b341111716a81695324be27

  • SHA1

    d79653b53e3affa5081d25cdea077299105d0472

  • SHA256

    a22f6db007744f7768782280e66832487b3b193ff20825203bb56210b7c4e923

  • SHA512

    e051e96a0334ce6cc7b6a43dffebfdcf93b40824db9cec64c6a2e71aed24bd26232645edbac14a47afe02fb0d12384da9648ea402df9232892330afce91fe303

  • SSDEEP

    3072:jqWg0oaxBGieuvQTtv6c/mTRPyZqqiIdhI+czv/gJQE7zK+l+2aVtUq9JosKh:jgP8GiHvQTV+d/qi25eKfU2cDJ18

Malware Config

Extracted

Family

xworm

Version

5.0

C2

husktools.duckdns.org:7000

Mutex

9W5nR6YNY2Cs1cQg

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      xwo.exe

    • Size

      189KB

    • MD5

      7949220a0b341111716a81695324be27

    • SHA1

      d79653b53e3affa5081d25cdea077299105d0472

    • SHA256

      a22f6db007744f7768782280e66832487b3b193ff20825203bb56210b7c4e923

    • SHA512

      e051e96a0334ce6cc7b6a43dffebfdcf93b40824db9cec64c6a2e71aed24bd26232645edbac14a47afe02fb0d12384da9648ea402df9232892330afce91fe303

    • SSDEEP

      3072:jqWg0oaxBGieuvQTtv6c/mTRPyZqqiIdhI+czv/gJQE7zK+l+2aVtUq9JosKh:jgP8GiHvQTV+d/qi25eKfU2cDJ18

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks