General

  • Target

    FULLOPTION CRACK BY MELT V2.1.exe

  • Size

    4.0MB

  • Sample

    241111-ekby3swkar

  • MD5

    167b9c9fdac699b76270c7de1c5be79f

  • SHA1

    1e30a9c99e3f9d04ab4a5964b209779700df5cf8

  • SHA256

    326cf06d90f11f9d0dcbb02e69bdab30635dbbabbda6c886dde897207f019d9d

  • SHA512

    1015c725d43251a40130929860305ba3cf54df417b5288820f89ca406e7f84400d372d77b0f5fbccd208f4d738c4d8b933488b3ce0fb47e37820932ef0343f1d

  • SSDEEP

    98304:GL9E+Y76D/jak6xrxOEnzPca0n5rK/iS:C9a7C/pUr730nmi

Score
10/10

Malware Config

Extracted

Family

xworm

C2

45.141.26.214:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    XClient.exe

Targets

    • Target

      FULLOPTION CRACK BY MELT V2.1.exe

    • Size

      4.0MB

    • MD5

      167b9c9fdac699b76270c7de1c5be79f

    • SHA1

      1e30a9c99e3f9d04ab4a5964b209779700df5cf8

    • SHA256

      326cf06d90f11f9d0dcbb02e69bdab30635dbbabbda6c886dde897207f019d9d

    • SHA512

      1015c725d43251a40130929860305ba3cf54df417b5288820f89ca406e7f84400d372d77b0f5fbccd208f4d738c4d8b933488b3ce0fb47e37820932ef0343f1d

    • SSDEEP

      98304:GL9E+Y76D/jak6xrxOEnzPca0n5rK/iS:C9a7C/pUr730nmi

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks