General

  • Target

    XClient.exe

  • Size

    293KB

  • Sample

    241108-wzef7azkbp

  • MD5

    359625f03d8b4582e2f2c60c21408767

  • SHA1

    b35f3c614a1800eb0a4c05110ab97c2a444eea9d

  • SHA256

    4c5eab954154b23bd51103b09adbd3cb842ab9a3969ff69ea54659860c9b7dab

  • SHA512

    6bfa05b40de708eb979d850ad14dd1b350aaf42a87ccfe32403f9e9c9ddaa5b474f8cc7036d9a28f976492315c617c0a11326fc65be7690fd338916bb2660adc

  • SSDEEP

    3072:6pkJuuEpKi6m/PJivSaAFOg7lkjcWVig058YbEASbod9btJ:

Score
10/10

Malware Config

Extracted

Family

xworm

C2

23.ip.gl.ply.gg:7000

Attributes
  • Install_directory

    %Public%

  • install_file

    svchost.exe

Targets

    • Target

      XClient.exe

    • Size

      293KB

    • MD5

      359625f03d8b4582e2f2c60c21408767

    • SHA1

      b35f3c614a1800eb0a4c05110ab97c2a444eea9d

    • SHA256

      4c5eab954154b23bd51103b09adbd3cb842ab9a3969ff69ea54659860c9b7dab

    • SHA512

      6bfa05b40de708eb979d850ad14dd1b350aaf42a87ccfe32403f9e9c9ddaa5b474f8cc7036d9a28f976492315c617c0a11326fc65be7690fd338916bb2660adc

    • SSDEEP

      3072:6pkJuuEpKi6m/PJivSaAFOg7lkjcWVig058YbEASbod9btJ:

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks