General

  • Target

    XClient.exe

  • Size

    233KB

  • Sample

    250121-wxbmhswram

  • MD5

    c5e1bae4b6509ae7e27db03a2d1ee31c

  • SHA1

    a927ff54a81d6ecc6771bf7b024c6f3ede48ca1d

  • SHA256

    c4ea12a0cc4f111e1ee0d80c9c6c2797fdf293ba60e903d49d3b5066686c9fdf

  • SHA512

    a4d6b2ac5db471857d6c192e88980f569718e4b10ada9f18f1b7c4efc7c042f72c62b75c7e4ab1b9b7abe312162cfb13eb7f21a141082b93772e6e2065bb619a

  • SSDEEP

    3072:WabIfVI0uYje+bU3ZFLORanu8SKfbzxcwg7es6/Vsb8VKTu549oJMfF/H9N3Ky91:WjV8ObanuUhcX7elbKTua9bfF/H9d9n

Malware Config

Extracted

Family

xworm

C2

est-review.gl.at.ply.gg:23712

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      XClient.exe

    • Size

      233KB

    • MD5

      c5e1bae4b6509ae7e27db03a2d1ee31c

    • SHA1

      a927ff54a81d6ecc6771bf7b024c6f3ede48ca1d

    • SHA256

      c4ea12a0cc4f111e1ee0d80c9c6c2797fdf293ba60e903d49d3b5066686c9fdf

    • SHA512

      a4d6b2ac5db471857d6c192e88980f569718e4b10ada9f18f1b7c4efc7c042f72c62b75c7e4ab1b9b7abe312162cfb13eb7f21a141082b93772e6e2065bb619a

    • SSDEEP

      3072:WabIfVI0uYje+bU3ZFLORanu8SKfbzxcwg7es6/Vsb8VKTu549oJMfF/H9N3Ky91:WjV8ObanuUhcX7elbKTua9bfF/H9d9n

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks