General

  • Target

    XClient.exe

  • Size

    64KB

  • Sample

    250125-zdasna1lar

  • MD5

    f2856bd1b6351010da3a14f6b0f7c292

  • SHA1

    70c10717ccee3d35a1e7c486d62a2f381fffcdc5

  • SHA256

    d9e512d2c1898eb3c85ae40ac96d1a6c753a501363f3acb657653e3eeda742ad

  • SHA512

    31b53b5b4edfe6b16f1a3c7832da197f41fd45773ad0440208520bfcaa70882850e538b3d25aac9844a2b2e2ed080cbf66bf52dd84094218801aee287e4f9069

  • SSDEEP

    1536:R6KA2uUSjs94apDo+NDkglx6fbIU4O/oB789PyIOuV0W:oK5Sg9UkDnwfbIFB7gPDOu6W

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    USB.exe

Targets

    • Target

      XClient.exe

    • Size

      64KB

    • MD5

      f2856bd1b6351010da3a14f6b0f7c292

    • SHA1

      70c10717ccee3d35a1e7c486d62a2f381fffcdc5

    • SHA256

      d9e512d2c1898eb3c85ae40ac96d1a6c753a501363f3acb657653e3eeda742ad

    • SHA512

      31b53b5b4edfe6b16f1a3c7832da197f41fd45773ad0440208520bfcaa70882850e538b3d25aac9844a2b2e2ed080cbf66bf52dd84094218801aee287e4f9069

    • SSDEEP

      1536:R6KA2uUSjs94apDo+NDkglx6fbIU4O/oB789PyIOuV0W:oK5Sg9UkDnwfbIFB7gPDOu6W

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks