General

  • Target

    XC23lient.exe

  • Size

    41KB

  • Sample

    250124-w2rjja1pbz

  • MD5

    149dc99ba79a2a64d3ee5c3328037e08

  • SHA1

    db9790265a2b1f02c9b3eadc88520377be615489

  • SHA256

    00e046b8e0f101d7bec1bffc118caec12e8c87b635ddcf069bf8a886cffb068f

  • SHA512

    3abd9ed5602f4af1c37f901565d728b4f9e8a4c5690f15a0f61e423dea91d6d6d563fc8447e3ca36696ca1e87befc8b24e89f8f3f3847fc2f9fa4dbb3a75991e

  • SSDEEP

    768:sgruLFKR9XO06kICp+pXAfNouatF5Pa9+XOwhP3/uXn:sId1ACMVAzuF49+XOwJGXn

Malware Config

Extracted

Family

xworm

Version

5.0

C2

jenoks-52356.portmap.host:52356

Mutex

RENMODhndjCDtqzz

Attributes
  • Install_directory

    %AppData%

  • install_file

    winconfig.exe

aes.plain

Targets

    • Target

      XC23lient.exe

    • Size

      41KB

    • MD5

      149dc99ba79a2a64d3ee5c3328037e08

    • SHA1

      db9790265a2b1f02c9b3eadc88520377be615489

    • SHA256

      00e046b8e0f101d7bec1bffc118caec12e8c87b635ddcf069bf8a886cffb068f

    • SHA512

      3abd9ed5602f4af1c37f901565d728b4f9e8a4c5690f15a0f61e423dea91d6d6d563fc8447e3ca36696ca1e87befc8b24e89f8f3f3847fc2f9fa4dbb3a75991e

    • SSDEEP

      768:sgruLFKR9XO06kICp+pXAfNouatF5Pa9+XOwhP3/uXn:sId1ACMVAzuF49+XOwJGXn

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks