General

  • Target

    XClient.exe

  • Size

    61KB

  • Sample

    250125-1jy8waspfn

  • MD5

    749532615ba40ead1048a013db63f232

  • SHA1

    3ee0802705c604c701d54610ebc8881b6c5d1722

  • SHA256

    88bb5a5fe3e9eb6dd9e68f8086ac795da6263337058dab762e0a7ecce9eee2e0

  • SHA512

    08a70e10a017b6126c296a68d559ec7b1fadf9c04c372a8dd40a46dc1e876947631b075f6cb4af46da86dc200c615afecd4b5d4187ff59f6848312c0582192e6

  • SSDEEP

    1536:MEt7v9JjRhBL7ZiO7DCWsnkbDMN7w5Ovgj:9tpJdj3ZrD6kbDMm5Ovu

Malware Config

Extracted

Family

xworm

C2

24.ip.gl.ply.gg:16322

Attributes
  • Install_directory

    %AppData%

  • install_file

    windowscleaner.exe

Targets

    • Target

      XClient.exe

    • Size

      61KB

    • MD5

      749532615ba40ead1048a013db63f232

    • SHA1

      3ee0802705c604c701d54610ebc8881b6c5d1722

    • SHA256

      88bb5a5fe3e9eb6dd9e68f8086ac795da6263337058dab762e0a7ecce9eee2e0

    • SHA512

      08a70e10a017b6126c296a68d559ec7b1fadf9c04c372a8dd40a46dc1e876947631b075f6cb4af46da86dc200c615afecd4b5d4187ff59f6848312c0582192e6

    • SSDEEP

      1536:MEt7v9JjRhBL7ZiO7DCWsnkbDMN7w5Ovgj:9tpJdj3ZrD6kbDMm5Ovu

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks