General

  • Target

    e6fde310def0ceb4c5a7d9d49ed742ab3fb397d74e6eeaac2794ef87cb42cf8b

  • Size

    65KB

  • Sample

    241113-x7khvaxhqh

  • MD5

    edafaa00a0abcf55ca36c17e9063b9cc

  • SHA1

    daa70d384f6e6dc14521b9c6bc9e52d5911476be

  • SHA256

    e6fde310def0ceb4c5a7d9d49ed742ab3fb397d74e6eeaac2794ef87cb42cf8b

  • SHA512

    502da5923664c12063468a53663b09ad52238ac58f803134fc3ae766f154f3da71b6e86d175eab7dcc62520cdd0438ca966aa61b22fe28c5311e030a71fc8cba

  • SSDEEP

    1536:T/y8CIH2mTVXSD7eJzITbdQbNK8jMdpzMQO+yCX:T/CIVTVXS6zIXdQbN5jMsQO+yG

Malware Config

Extracted

Family

xworm

C2

dog-leaves.gl.at.ply.gg:34663

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      e6fde310def0ceb4c5a7d9d49ed742ab3fb397d74e6eeaac2794ef87cb42cf8b

    • Size

      65KB

    • MD5

      edafaa00a0abcf55ca36c17e9063b9cc

    • SHA1

      daa70d384f6e6dc14521b9c6bc9e52d5911476be

    • SHA256

      e6fde310def0ceb4c5a7d9d49ed742ab3fb397d74e6eeaac2794ef87cb42cf8b

    • SHA512

      502da5923664c12063468a53663b09ad52238ac58f803134fc3ae766f154f3da71b6e86d175eab7dcc62520cdd0438ca966aa61b22fe28c5311e030a71fc8cba

    • SSDEEP

      1536:T/y8CIH2mTVXSD7eJzITbdQbNK8jMdpzMQO+yCX:T/CIVTVXS6zIXdQbN5jMsQO+yG

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks