General

  • Target

    XClient.exe

  • Size

    74KB

  • Sample

    241109-r26k8swfqm

  • MD5

    e54502823034c0de90d4088727d05b26

  • SHA1

    764f2284c3df4fccd722e1c8c70336eb32cd3f2b

  • SHA256

    491d899f31864d337589eca674bc922e970e27ca872ce227c98caca207040cc9

  • SHA512

    ba8dda1b2b23ebcced8c60c1fcd83162a31a8875320da2dc22855bde530a327a79105971073b7ebadd91bf00a237f0963b4786c1520b07c5d3d3aa7ee7f0b8f7

  • SSDEEP

    1536:LZbBSfEJ9c4QBg7JtFxQs6+b5sMPzJQ3QVyt/O61p1db8:NbBSMJa4Qqli+byWJuOm/db8

Malware Config

Extracted

Family

xworm

C2

books-royalty.gl.at.ply.gg:30157

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

Targets

    • Target

      XClient.exe

    • Size

      74KB

    • MD5

      e54502823034c0de90d4088727d05b26

    • SHA1

      764f2284c3df4fccd722e1c8c70336eb32cd3f2b

    • SHA256

      491d899f31864d337589eca674bc922e970e27ca872ce227c98caca207040cc9

    • SHA512

      ba8dda1b2b23ebcced8c60c1fcd83162a31a8875320da2dc22855bde530a327a79105971073b7ebadd91bf00a237f0963b4786c1520b07c5d3d3aa7ee7f0b8f7

    • SSDEEP

      1536:LZbBSfEJ9c4QBg7JtFxQs6+b5sMPzJQ3QVyt/O61p1db8:NbBSMJa4Qqli+byWJuOm/db8

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks