General

  • Target

    XClient4.exe

  • Size

    33KB

  • Sample

    241106-x91ylsymgp

  • MD5

    7ce0316f7dc2e0d59f7274bdc18aa566

  • SHA1

    3e8bae2ebcb5ba258634f5e31e6479ac31760147

  • SHA256

    8a64168a70be9147486da40573ecb300a8427c019b82169c58eae4b3e0d94ac7

  • SHA512

    d933b193c14986067c5ff30a8bd41c702f849afffe755398064bf88e162121f042da2e78ecf4acbf7e6a5de86ac1271bc612db8c4cbc6f5b4efc26153363a531

  • SSDEEP

    768:+4fK1pDGkptwyZScCBSUapNgqlDU/fZl+BcgN7AlTF59iBO9hHS8Rf:ODGkptwyZScCkU4rNUXZcB5N7QF59iB6

Malware Config

Extracted

Family

xworm

Version

3.1

C2

celex-35359.portmap.host:35359

Mutex

7GxIsOHgvkeBSkzn

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient4.exe

    • Size

      33KB

    • MD5

      7ce0316f7dc2e0d59f7274bdc18aa566

    • SHA1

      3e8bae2ebcb5ba258634f5e31e6479ac31760147

    • SHA256

      8a64168a70be9147486da40573ecb300a8427c019b82169c58eae4b3e0d94ac7

    • SHA512

      d933b193c14986067c5ff30a8bd41c702f849afffe755398064bf88e162121f042da2e78ecf4acbf7e6a5de86ac1271bc612db8c4cbc6f5b4efc26153363a531

    • SSDEEP

      768:+4fK1pDGkptwyZScCBSUapNgqlDU/fZl+BcgN7AlTF59iBO9hHS8Rf:ODGkptwyZScCkU4rNUXZcB5N7QF59iB6

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

MITRE ATT&CK Enterprise v15

Tasks