General

  • Target

    XClient.exe

  • Size

    33KB

  • Sample

    250119-ld2pgsslgs

  • MD5

    9548ab8c25f4d68ee82f30614b894610

  • SHA1

    3cd430018f06d22887175307e2d14e4796d86222

  • SHA256

    2462f6663eed6000fe8db91857170246530df7ce156ced422c73b3f1000f3ec9

  • SHA512

    635eb77d7586411539f11b41135392c3ab096617f50f4b652226d073624b8d1f684c0a01203334ee2f9e5929a365a33d404f4e1f4c79752ec8736f3635f0d8ba

  • SSDEEP

    384:Tl0UMD9SszMJ11DcS/i8L7zZ3ZFsLcvSAOo6PRApkFTBLTsOZwpGN2v99IkuisoH:JoD9vQB3Z3HJvlOPVF89jsOjhCbg

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

7.tcp.eu.ngrok.io:11135

Mutex

Y5ZJT9tdrWfHkA4C

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      33KB

    • MD5

      9548ab8c25f4d68ee82f30614b894610

    • SHA1

      3cd430018f06d22887175307e2d14e4796d86222

    • SHA256

      2462f6663eed6000fe8db91857170246530df7ce156ced422c73b3f1000f3ec9

    • SHA512

      635eb77d7586411539f11b41135392c3ab096617f50f4b652226d073624b8d1f684c0a01203334ee2f9e5929a365a33d404f4e1f4c79752ec8736f3635f0d8ba

    • SSDEEP

      384:Tl0UMD9SszMJ11DcS/i8L7zZ3ZFsLcvSAOo6PRApkFTBLTsOZwpGN2v99IkuisoH:JoD9vQB3Z3HJvlOPVF89jsOjhCbg

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks