General

  • Target

    77a2957f0b36feb1b71e9a7bb2d40d33.bin

  • Size

    522KB

  • Sample

    241106-bp9jcsvmep

  • MD5

    8ff0c807bf457ce87bd2cbe88f30f10d

  • SHA1

    26a41865d28d49005b83a4e0683b520be0e9a895

  • SHA256

    0dad9afc978334839dd03bdcd93a9abeadfc53a0d285b80193c4e04e9552ca07

  • SHA512

    37e6734bbdf7b3e9910b56d6887d8d604d70a3d9905d416b9c5dbf4e39e99081fbd57e7adf8b7f7facb000fb6504f44ee94b5e48efb7975656cbe2ab93643220

  • SSDEEP

    12288:bS/kKa2ZvXwG0moZJc+3gxRp6n/HRSxpwyiZmmQE:b5sZIoorjwxiJk2yiZ31

Malware Config

Extracted

Family

xworm

Version

5.0

C2

173.205.83.196:3210

Mutex

jJqPmV7YRG8bldRA

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      17342376576faeacd5722d9f09635eea207de2343f4d81e67cb35bb08c18dc8c.exe

    • Size

      965KB

    • MD5

      77a2957f0b36feb1b71e9a7bb2d40d33

    • SHA1

      272b5e1731b0e00ab84af461adae211297a35386

    • SHA256

      17342376576faeacd5722d9f09635eea207de2343f4d81e67cb35bb08c18dc8c

    • SHA512

      2ab5f17a2d2b6d1369cd410b5fe3cce7eb880313b1941012ea95cae55ed8be2c4bc7b7c9d1791dc4187fcd433b8b5a414842f8e8872ac195e88752875a6cfc4d

    • SSDEEP

      12288:2hkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aI9AalvPpfK5I9H:mRmJkcoQricOIQxiZY1iaI9tlvJ8IZ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks