General

  • Target

    $77Client.exe

  • Size

    36KB

  • Sample

    241120-xrmy2ascnk

  • MD5

    d34ce882198bf4b647391e626aa7479c

  • SHA1

    4c6ba05c0a3b7fef8692a1ed1897a8d52c7dce7d

  • SHA256

    199ee3f18851c782245dcab588d564a6bf478a8e6ed58a24282c5d0da2b13b57

  • SHA512

    5c51d583858f37102a55fbe472aab4f05925a800ddcb1e2d2b86643b8793f60a0002fb95853822c66df9b61479a45ea22e668b63d823112a037c45f608e8a538

  • SSDEEP

    768:nFeJlFivlhnUH4o0+1Rxe6NFWPh9GTOwhao9FXkrI:nwJlQRUYo0WHrFK9GTOwoo72I

Malware Config

Extracted

Family

xworm

Version

3.0

C2

45.139.196.128:1111

Mutex

I41RJCTV1NVWwUi1

Attributes
  • Install_directory

    %Public%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      $77Client.exe

    • Size

      36KB

    • MD5

      d34ce882198bf4b647391e626aa7479c

    • SHA1

      4c6ba05c0a3b7fef8692a1ed1897a8d52c7dce7d

    • SHA256

      199ee3f18851c782245dcab588d564a6bf478a8e6ed58a24282c5d0da2b13b57

    • SHA512

      5c51d583858f37102a55fbe472aab4f05925a800ddcb1e2d2b86643b8793f60a0002fb95853822c66df9b61479a45ea22e668b63d823112a037c45f608e8a538

    • SSDEEP

      768:nFeJlFivlhnUH4o0+1Rxe6NFWPh9GTOwhao9FXkrI:nwJlQRUYo0WHrFK9GTOwoo72I

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks