General

  • Target

    XClient.exe

  • Size

    37KB

  • Sample

    250120-qbet6azral

  • MD5

    57d5ddc2d3726c27b999b78835847723

  • SHA1

    95856a3ca2fe5398b39ff6d0b96ecead3dcba5ae

  • SHA256

    d273c5a7fc67ffe825da917d8096a684615baa87cfa6ef2203dca9072947bf96

  • SHA512

    3cc367d83274bffb4502a2cb523d828d747d50ac5bed9b9f9f215ba64a795ddddf4aa5a5322762a7aa130ac2d39c42ea4c3c8b7abdd6f2ab1e7a383c13d58a0c

  • SSDEEP

    768:iR2u+a5hfcss3M6tQqb3rZTFL9P+sOMhTbA:iR2u7e56qFFL9P+sOMNU

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

147.185.221.22:7000

Mutex

hli2xFOEY4GGN5gH

Attributes
  • Install_directory

    %AppData%

  • install_file

    joseph.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      37KB

    • MD5

      57d5ddc2d3726c27b999b78835847723

    • SHA1

      95856a3ca2fe5398b39ff6d0b96ecead3dcba5ae

    • SHA256

      d273c5a7fc67ffe825da917d8096a684615baa87cfa6ef2203dca9072947bf96

    • SHA512

      3cc367d83274bffb4502a2cb523d828d747d50ac5bed9b9f9f215ba64a795ddddf4aa5a5322762a7aa130ac2d39c42ea4c3c8b7abdd6f2ab1e7a383c13d58a0c

    • SSDEEP

      768:iR2u+a5hfcss3M6tQqb3rZTFL9P+sOMhTbA:iR2u7e56qFFL9P+sOMNU

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks