General

  • Target

    Loader.exe

  • Size

    66KB

  • Sample

    241116-j5zyvssgnh

  • MD5

    628b8d56d18d4d581c20372b423b8138

  • SHA1

    7a1cb2fe1995dd00c2b8027ae1f51bfef5ecd1ca

  • SHA256

    093b42daa9fef07bb6bc493f5b158070557d4e2980965b58a69eae544119384c

  • SHA512

    7f82b46e2b9bdf25bd5cdfb348048126a7c0a4bb4e07a7b22e2b71948dcf3d8699e08a22c0c77927525e5dadcfa3574587a9fa8ccd8138791ef173475acc16cd

  • SSDEEP

    1536:iEkWcN6qFFL9PAOMx37PlSiR5smz9RGFS1:iEkWO6qFFL9PAOMZ9SOC4

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

PMawnpd159lRre2h

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      Loader.exe

    • Size

      66KB

    • MD5

      628b8d56d18d4d581c20372b423b8138

    • SHA1

      7a1cb2fe1995dd00c2b8027ae1f51bfef5ecd1ca

    • SHA256

      093b42daa9fef07bb6bc493f5b158070557d4e2980965b58a69eae544119384c

    • SHA512

      7f82b46e2b9bdf25bd5cdfb348048126a7c0a4bb4e07a7b22e2b71948dcf3d8699e08a22c0c77927525e5dadcfa3574587a9fa8ccd8138791ef173475acc16cd

    • SSDEEP

      1536:iEkWcN6qFFL9PAOMx37PlSiR5smz9RGFS1:iEkWO6qFFL9PAOMZ9SOC4

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks