General

  • Target

    XClient.exe

  • Size

    293KB

  • Sample

    241108-wyfymaxcpm

  • MD5

    a9e2c7349ceae0894c2636ac7c91d99a

  • SHA1

    de535327d9486760e1bb42b48f84d677ae8a186d

  • SHA256

    d6a8076c0859b43193eba0b71d1da545c16c64c735138d8ddeadaedfe90136fc

  • SHA512

    67b4f65415d1b228ac93bcf482220067a1f3a3519ffc25df6687808b9d5143d8aa19ba797b96b9c08c6268058c07b3f074b2cf442c47f8874ffee54f8325765a

  • SSDEEP

    3072:+pkJuuEpKi6m/PJivSaAFOg7lkjcWVig058YbEASbod9btj:

Score
10/10

Malware Config

Extracted

Family

xworm

C2

23.ip.gl.ply.gg:7000

Attributes
  • Install_directory

    %Public%

  • install_file

    svchost.exe

Targets

    • Target

      XClient.exe

    • Size

      293KB

    • MD5

      a9e2c7349ceae0894c2636ac7c91d99a

    • SHA1

      de535327d9486760e1bb42b48f84d677ae8a186d

    • SHA256

      d6a8076c0859b43193eba0b71d1da545c16c64c735138d8ddeadaedfe90136fc

    • SHA512

      67b4f65415d1b228ac93bcf482220067a1f3a3519ffc25df6687808b9d5143d8aa19ba797b96b9c08c6268058c07b3f074b2cf442c47f8874ffee54f8325765a

    • SSDEEP

      3072:+pkJuuEpKi6m/PJivSaAFOg7lkjcWVig058YbEASbod9btj:

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks