General

  • Target

    XClient.exe

  • Size

    76KB

  • Sample

    241109-r1p7vswepe

  • MD5

    8807fa0a397ac570dd8b1d6bed1aadc5

  • SHA1

    27531764eb5629d02ef10ad25a89328daa442f5a

  • SHA256

    3465eee847488e3fd2f70bc78642ce8f82cbef40b95b5ac448901d9e13c07dbb

  • SHA512

    ebedb1bd4ee83d2e1f97868c0cd5574e34deb2e61db2ec01e3ae32f11e979504a527391fdd3dcad02f785a4ea7d87084b23f396316a06fda3e01f8f1341f790b

  • SSDEEP

    1536:eX3pX/Z0rG675wHvayJbtE+bC5v5tUfJ3X1QkOyog9B3Kqb8:eX3R/KrN74ayJa+bCVQRekOG9Baqb8

Malware Config

Extracted

Family

xworm

C2

192.168.29.241:22119

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

Targets

    • Target

      XClient.exe

    • Size

      76KB

    • MD5

      8807fa0a397ac570dd8b1d6bed1aadc5

    • SHA1

      27531764eb5629d02ef10ad25a89328daa442f5a

    • SHA256

      3465eee847488e3fd2f70bc78642ce8f82cbef40b95b5ac448901d9e13c07dbb

    • SHA512

      ebedb1bd4ee83d2e1f97868c0cd5574e34deb2e61db2ec01e3ae32f11e979504a527391fdd3dcad02f785a4ea7d87084b23f396316a06fda3e01f8f1341f790b

    • SSDEEP

      1536:eX3pX/Z0rG675wHvayJbtE+bC5v5tUfJ3X1QkOyog9B3Kqb8:eX3R/KrN74ayJa+bCVQRekOG9Baqb8

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks