General

  • Target

    XClient.exe

  • Size

    293KB

  • Sample

    241108-wwdeqazjgm

  • MD5

    ee214d10a2af9c85607bd8505e48183f

  • SHA1

    acf03f4f6a1a55db5e2df2683f628dc301006000

  • SHA256

    2551f4ee4a0f5e2c91eb84dc75fbc00092cb7682d84c64e54f1a39ca075781f7

  • SHA512

    d3abae4f437675a3d6b30a3d021075299546675e23f57905f35d4f2c3ddf05c8558518485b972fadbeb4aaab5cfaea13f432bdc15f69154fcb5ffb3f990f0767

  • SSDEEP

    3072:TRNpkJuuEpKi6m/PJivSaAFOg7lkjcWVig058YbEASbod9bt+:T

Score
10/10

Malware Config

Extracted

Family

xworm

C2

23.ip.gl.ply.gg:7000

Attributes
  • Install_directory

    %Public%

  • install_file

    svchost.exe

Targets

    • Target

      XClient.exe

    • Size

      293KB

    • MD5

      ee214d10a2af9c85607bd8505e48183f

    • SHA1

      acf03f4f6a1a55db5e2df2683f628dc301006000

    • SHA256

      2551f4ee4a0f5e2c91eb84dc75fbc00092cb7682d84c64e54f1a39ca075781f7

    • SHA512

      d3abae4f437675a3d6b30a3d021075299546675e23f57905f35d4f2c3ddf05c8558518485b972fadbeb4aaab5cfaea13f432bdc15f69154fcb5ffb3f990f0767

    • SSDEEP

      3072:TRNpkJuuEpKi6m/PJivSaAFOg7lkjcWVig058YbEASbod9bt+:T

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks