General

  • Target

    eternal.exe

  • Size

    69KB

  • Sample

    241117-l9nshasjfj

  • MD5

    7439cc991a9a756c41153b8e9121baab

  • SHA1

    c62528386e5f62ff2975cc8ed0cad3a7d362e632

  • SHA256

    31a2b821e933bb193d94438d4a5aa036519535336c936d65b66889fb03164e2d

  • SHA512

    cbdfd77671884407f8f4bd9c5251df5d8896b29bd004ea52460eda8a222df7492c69572e044376315624220f3ea66de3aff34323ea281591ca2975f90fa6dd51

  • SSDEEP

    1536:dEmkVu+xslqytUTZfJM6htYxrlYCbM1/kCxtD6LOSIcRGPUC:dEZZx8q/fJLtYFZbM1segO3cQ8C

Malware Config

Extracted

Family

xworm

C2

147.185.221.23:33942

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      eternal.exe

    • Size

      69KB

    • MD5

      7439cc991a9a756c41153b8e9121baab

    • SHA1

      c62528386e5f62ff2975cc8ed0cad3a7d362e632

    • SHA256

      31a2b821e933bb193d94438d4a5aa036519535336c936d65b66889fb03164e2d

    • SHA512

      cbdfd77671884407f8f4bd9c5251df5d8896b29bd004ea52460eda8a222df7492c69572e044376315624220f3ea66de3aff34323ea281591ca2975f90fa6dd51

    • SSDEEP

      1536:dEmkVu+xslqytUTZfJM6htYxrlYCbM1/kCxtD6LOSIcRGPUC:dEZZx8q/fJLtYFZbM1segO3cQ8C

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks