General

  • Target

    XClient1 (1).exe

  • Size

    71KB

  • Sample

    250121-t2pzlatjhj

  • MD5

    aaa0991028b186830fc63c3a85b027ac

  • SHA1

    4bf96ceb4da0f501cd3e1fafa9235628d5717eff

  • SHA256

    3fb8d58a4307a082122f4cc8c192f5548b57c7ae4e4ed11a5acf4257ce751649

  • SHA512

    ff14e3cc4f512f836258c9070d17fd72b2157f8180852204ca490c9f295026b43385dbbbf5285c2777e4c41ba8dbfd3db094bc6bf9cba71bf198af8e1bb25c80

  • SSDEEP

    1536:IRUECHMT3yp4N5MwB52FmZbq2RQO2VN2OS0v0:INCHKicYFebqAQveOS0c

Score
10/10

Malware Config

Extracted

Family

xworm

C2

147.185.221.25:2324

Attributes
  • install_file

    USB.exe

Targets

    • Target

      XClient1 (1).exe

    • Size

      71KB

    • MD5

      aaa0991028b186830fc63c3a85b027ac

    • SHA1

      4bf96ceb4da0f501cd3e1fafa9235628d5717eff

    • SHA256

      3fb8d58a4307a082122f4cc8c192f5548b57c7ae4e4ed11a5acf4257ce751649

    • SHA512

      ff14e3cc4f512f836258c9070d17fd72b2157f8180852204ca490c9f295026b43385dbbbf5285c2777e4c41ba8dbfd3db094bc6bf9cba71bf198af8e1bb25c80

    • SSDEEP

      1536:IRUECHMT3yp4N5MwB52FmZbq2RQO2VN2OS0v0:INCHKicYFebqAQveOS0c

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks