General

  • Target

    XClient.exe

  • Size

    30KB

  • Sample

    250118-tg63daylfn

  • MD5

    b8722a38ee0cb07e0248c1c98ea21b9f

  • SHA1

    8aabd45c2526a84c94750dd5ef66198f651ccadf

  • SHA256

    2da695e0aa8a0b6e1dfb5b33f815a893c1b6a3b4aa6ff6ddd3c1df8c1cd79c21

  • SHA512

    bb013e63b9cfa68b023877af15fba4b3ce5a33f158dc027f4332433405ac09de307d9e20b214c2b05add494c5a8f89af9b70a91007966dff3c224e75458c9ab7

  • SSDEEP

    768:GrgECfLH8MYAoR/iw2uBFE9RLeOqhUbT:YgRUiw24FE9RLeOqan

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

C2

0.tcp.eu.ngrok.io:17946

Mutex

o7b0BzsHdNFs9k6J

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      30KB

    • MD5

      b8722a38ee0cb07e0248c1c98ea21b9f

    • SHA1

      8aabd45c2526a84c94750dd5ef66198f651ccadf

    • SHA256

      2da695e0aa8a0b6e1dfb5b33f815a893c1b6a3b4aa6ff6ddd3c1df8c1cd79c21

    • SHA512

      bb013e63b9cfa68b023877af15fba4b3ce5a33f158dc027f4332433405ac09de307d9e20b214c2b05add494c5a8f89af9b70a91007966dff3c224e75458c9ab7

    • SSDEEP

      768:GrgECfLH8MYAoR/iw2uBFE9RLeOqhUbT:YgRUiw24FE9RLeOqan

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks