Resubmissions

22/11/2024, 03:21

241122-dwphwazkfj 10

22/11/2024, 03:04

241122-dkzjpstkay 10

General

  • Target

    XClient.exe

  • Size

    39KB

  • Sample

    241122-dkzjpstkay

  • MD5

    bc66e4663ecc5fe2d5c1ffb6399e828a

  • SHA1

    95ef4b4ebecde00da0a3c6630a3556fb19b46a1a

  • SHA256

    7c2910c7548a6fd1fe7eeacb7c24105a7049b670f1de0f5dbbe718e1d3cd3c70

  • SHA512

    1334e5d14e5f85a2dbead8b566e5e78748b857e25da313a544699d6d5fcbf400d70619c41f3e1d56cd57006002f8a4ba8c7a21002fd6412dae54470087cca0d9

  • SSDEEP

    768:Lz6nA3MxG5g8y5AcksKyJjL77FWPa9X2OwhAaG8r:/6nUuf5A72Fv9X2Ow6T8r

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:2068

127.0.0.1:7000

192.168.68.139:7000

12.10.181.74:7000

Mutex

6oJ1GSe3avoqc597

Attributes
  • Install_directory

    %AppData%

  • install_file

    FileExplorer.exe

aes.plain
aes.plain
aes.plain
aes.plain
aes.plain
aes.plain
aes.plain

Targets

    • Target

      XClient.exe

    • Size

      39KB

    • MD5

      bc66e4663ecc5fe2d5c1ffb6399e828a

    • SHA1

      95ef4b4ebecde00da0a3c6630a3556fb19b46a1a

    • SHA256

      7c2910c7548a6fd1fe7eeacb7c24105a7049b670f1de0f5dbbe718e1d3cd3c70

    • SHA512

      1334e5d14e5f85a2dbead8b566e5e78748b857e25da313a544699d6d5fcbf400d70619c41f3e1d56cd57006002f8a4ba8c7a21002fd6412dae54470087cca0d9

    • SSDEEP

      768:Lz6nA3MxG5g8y5AcksKyJjL77FWPa9X2OwhAaG8r:/6nUuf5A72Fv9X2Ow6T8r

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks