General

  • Target

    rekz.exe

  • Size

    51KB

  • Sample

    241111-es3rrsseqp

  • MD5

    99116e57feb2818d7e64e9f4a51ec601

  • SHA1

    a10d8277588982816ec9d41e0dfe66962b80adcf

  • SHA256

    759bde9c2ba4b4b5b71711e53a977af68f42c8e45944eaa72b34749d37f96f8f

  • SHA512

    f65cf487b6d9ef1e2ca4a321ec434610592f148a65b77ae3ac23e023244862db353c7b5b5dbdbf0e5ca6faebb437aa455ce9081e8546fcc3728a012e668824db

  • SSDEEP

    1536:Y4DweQldSgDIgXvvgcFI9Af6vOwW9zdS1EAd8II8:Y4DweeSgDXvvgcFI9A2OwagEA6II8

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

147.185.221.23:49592:7000

Mutex

AaKOzkq2FwZmFPLZ

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      rekz.exe

    • Size

      51KB

    • MD5

      99116e57feb2818d7e64e9f4a51ec601

    • SHA1

      a10d8277588982816ec9d41e0dfe66962b80adcf

    • SHA256

      759bde9c2ba4b4b5b71711e53a977af68f42c8e45944eaa72b34749d37f96f8f

    • SHA512

      f65cf487b6d9ef1e2ca4a321ec434610592f148a65b77ae3ac23e023244862db353c7b5b5dbdbf0e5ca6faebb437aa455ce9081e8546fcc3728a012e668824db

    • SSDEEP

      1536:Y4DweQldSgDIgXvvgcFI9Af6vOwW9zdS1EAd8II8:Y4DweeSgDXvvgcFI9A2OwagEA6II8

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks