General

  • Target

    XClient.exe

  • Size

    30KB

  • Sample

    250118-tq7p9sxnf1

  • MD5

    dac40ddefa6c0bc8e2693d7e41ef0b41

  • SHA1

    ea38c77397e6327762d99f9a6f4628770329fc21

  • SHA256

    f1a80e0d33878b9c584e1ccc3c3953c0dcd7da401fe2108fd8cd5b05f58706c3

  • SHA512

    fdb58c4e02070771ed2c8178939541b307ce07f37270f479ab98421264f923a868030de9038ff9a51330d5f15f406c43f8eee6b18b655c08c9e2980e1c5cdc7b

  • SSDEEP

    768:frgECfLH8MYAoR/iw2uBFE9Rx1Oqhxb3:DgRUiw24FE9Rx1OqvT

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

C2

6.tcp.eu.ngrok.io:12793

Mutex

AapwYw9EYWNu81ra

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      30KB

    • MD5

      dac40ddefa6c0bc8e2693d7e41ef0b41

    • SHA1

      ea38c77397e6327762d99f9a6f4628770329fc21

    • SHA256

      f1a80e0d33878b9c584e1ccc3c3953c0dcd7da401fe2108fd8cd5b05f58706c3

    • SHA512

      fdb58c4e02070771ed2c8178939541b307ce07f37270f479ab98421264f923a868030de9038ff9a51330d5f15f406c43f8eee6b18b655c08c9e2980e1c5cdc7b

    • SSDEEP

      768:frgECfLH8MYAoR/iw2uBFE9Rx1Oqhxb3:DgRUiw24FE9Rx1OqvT

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks