General

  • Target

    wwwww.exe

  • Size

    15.9MB

  • Sample

    241107-lj9x2syqfw

  • MD5

    844f6c30ddab8bccc334c70ba4359e98

  • SHA1

    dd9455fa8138213edc2f4f12b2d248b31edcae2d

  • SHA256

    54fa1f416dfd0e53f4fbd45f2f30ec470ab8b02f5d5ff019d61f20bfd62a8a24

  • SHA512

    e1652261680518de89a0c7d4cfd06ca41a7b0ec973bcc959c520397eef3214783eca624482f593cd43a4dc51e4f79718125c2f62915f3121bc6ce5a866c54d14

  • SSDEEP

    393216:V8iJqDGCjr4xMA/YrHiLfygdkqxYc1cT8/TcdsDCGMRqA:lJCjr3hEJY6coTcdsDC

Malware Config

Extracted

Family

xworm

C2

85.203.4.149:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    XClient.exe

Targets

    • Target

      wwwww.exe

    • Size

      15.9MB

    • MD5

      844f6c30ddab8bccc334c70ba4359e98

    • SHA1

      dd9455fa8138213edc2f4f12b2d248b31edcae2d

    • SHA256

      54fa1f416dfd0e53f4fbd45f2f30ec470ab8b02f5d5ff019d61f20bfd62a8a24

    • SHA512

      e1652261680518de89a0c7d4cfd06ca41a7b0ec973bcc959c520397eef3214783eca624482f593cd43a4dc51e4f79718125c2f62915f3121bc6ce5a866c54d14

    • SSDEEP

      393216:V8iJqDGCjr4xMA/YrHiLfygdkqxYc1cT8/TcdsDCGMRqA:lJCjr3hEJY6coTcdsDC

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks