General

  • Target

    Gorilla tag.exe

  • Size

    429KB

  • Sample

    250121-r3w37ayrck

  • MD5

    a47502d0bdaa67d14c762565ee7864d6

  • SHA1

    afed9a6ac84e97bbd2dc2593ff6204716e696695

  • SHA256

    20ba1d60db4e5d51a698d7ab07e8a5dd75cd6aaae792c76dda315d757b9dfdde

  • SHA512

    dae6c201c878da5438a58bc6258cb7287ddfbf002c01c0a13deb4039a4fe5e8a85be04c57367f56de4ac26ae0a3fb0d166b27e06de354bf3b2efd38af5c636e9

  • SSDEEP

    6144:BkGb8qJ+GIIIIIIIhIIIIIIIIIIIIIIIUz9bfF/H9d9n:BRC9

Malware Config

Extracted

Family

xworm

C2

est-review.gl.at.ply.gg:21148

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      Gorilla tag.exe

    • Size

      429KB

    • MD5

      a47502d0bdaa67d14c762565ee7864d6

    • SHA1

      afed9a6ac84e97bbd2dc2593ff6204716e696695

    • SHA256

      20ba1d60db4e5d51a698d7ab07e8a5dd75cd6aaae792c76dda315d757b9dfdde

    • SHA512

      dae6c201c878da5438a58bc6258cb7287ddfbf002c01c0a13deb4039a4fe5e8a85be04c57367f56de4ac26ae0a3fb0d166b27e06de354bf3b2efd38af5c636e9

    • SSDEEP

      6144:BkGb8qJ+GIIIIIIIhIIIIIIIIIIIIIIIUz9bfF/H9d9n:BRC9

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks