General

  • Target

    37df6c75773a17be3487e82ca20139252d7c5ca15e0cc4fd08a0b93ae87adbd3.exe

  • Size

    52KB

  • Sample

    250122-sqlx5aslhw

  • MD5

    02279d272e81a497330f22cfa866dc54

  • SHA1

    11228964549687fcabdc66a3059cd75fcf18bdcd

  • SHA256

    37df6c75773a17be3487e82ca20139252d7c5ca15e0cc4fd08a0b93ae87adbd3

  • SHA512

    9eff45b22dadec11c640f97d994d6e744aa17f9fb8131eecfdf431a6e2cb18f7b9e1eb29717377430c4c7c48a71ba2ef0afc7c55eea7974b2d46372ccb2c9f67

  • SSDEEP

    1536:cpHDSBc87/UWF70l/Crbi/OZu71Omwkn2OBCyO:cYW8rHF70l/Ybi/HOt+fTO

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:8848

u-football.gl.at.ply.gg:8848

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      37df6c75773a17be3487e82ca20139252d7c5ca15e0cc4fd08a0b93ae87adbd3.exe

    • Size

      52KB

    • MD5

      02279d272e81a497330f22cfa866dc54

    • SHA1

      11228964549687fcabdc66a3059cd75fcf18bdcd

    • SHA256

      37df6c75773a17be3487e82ca20139252d7c5ca15e0cc4fd08a0b93ae87adbd3

    • SHA512

      9eff45b22dadec11c640f97d994d6e744aa17f9fb8131eecfdf431a6e2cb18f7b9e1eb29717377430c4c7c48a71ba2ef0afc7c55eea7974b2d46372ccb2c9f67

    • SSDEEP

      1536:cpHDSBc87/UWF70l/Crbi/OZu71Omwkn2OBCyO:cYW8rHF70l/Ybi/HOt+fTO

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks