General

  • Target

    15beca1f15d1866bf0c7a86b5217f4980b2214d22c44867e89cd872056e4c497.exe

  • Size

    34KB

  • Sample

    250120-cjmcbawlax

  • MD5

    d1a871dd91c12b3c2504f783e591ea67

  • SHA1

    c1c069b6bb97970ff619802d145321d2b3c0d63d

  • SHA256

    15beca1f15d1866bf0c7a86b5217f4980b2214d22c44867e89cd872056e4c497

  • SHA512

    d4fe32f23f4a608e71c8b93035c46846df77a6d0138249ab6589c3e20e9731c42bd4141716eda19c2372e195a10c7a83b5183831a12279e2e9130b7ba6f8f681

  • SSDEEP

    768:N+CiFHO8ede9gbL6qBPV29Fm9YcOjhd/VUO:N+Nu8edHimeFm9YcOjHtUO

Malware Config

Extracted

Family

xworm

Version

5.0

C2

networks-vitamin.gl.at.ply.gg:9007

Mutex

x6jWkN23BeZDcsvq

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      15beca1f15d1866bf0c7a86b5217f4980b2214d22c44867e89cd872056e4c497.exe

    • Size

      34KB

    • MD5

      d1a871dd91c12b3c2504f783e591ea67

    • SHA1

      c1c069b6bb97970ff619802d145321d2b3c0d63d

    • SHA256

      15beca1f15d1866bf0c7a86b5217f4980b2214d22c44867e89cd872056e4c497

    • SHA512

      d4fe32f23f4a608e71c8b93035c46846df77a6d0138249ab6589c3e20e9731c42bd4141716eda19c2372e195a10c7a83b5183831a12279e2e9130b7ba6f8f681

    • SSDEEP

      768:N+CiFHO8ede9gbL6qBPV29Fm9YcOjhd/VUO:N+Nu8edHimeFm9YcOjHtUO

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks