General

  • Target

    XClient.exe

  • Size

    332KB

  • Sample

    250303-da9lxst1a1

  • MD5

    c569be3a5b8a89c37256459185a05956

  • SHA1

    f1de01df8188904e094dea22f2a6158ab73892bb

  • SHA256

    f149065febc97dc6b4ef73940dbd286e1bab78c85fa0cb97f2c544e0da49e85b

  • SHA512

    6995f182613637325c4f2cc96c33ff32f9465e7a3c2efed491b83f0140092ad2304ac140cc60deed4e8b4d848cd8ff15f389590fecd5e22500dc14137ca2bb85

  • SSDEEP

    6144:OWn1URqbiPkvoT+GIIIIIIIhIIIIIIIIIIIIIIIU:OFbPso0

Score
10/10

Malware Config

Extracted

Family

xworm

C2

45.88.91.55:3958

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    steam-helper.exe

Targets

    • Target

      XClient.exe

    • Size

      332KB

    • MD5

      c569be3a5b8a89c37256459185a05956

    • SHA1

      f1de01df8188904e094dea22f2a6158ab73892bb

    • SHA256

      f149065febc97dc6b4ef73940dbd286e1bab78c85fa0cb97f2c544e0da49e85b

    • SHA512

      6995f182613637325c4f2cc96c33ff32f9465e7a3c2efed491b83f0140092ad2304ac140cc60deed4e8b4d848cd8ff15f389590fecd5e22500dc14137ca2bb85

    • SSDEEP

      6144:OWn1URqbiPkvoT+GIIIIIIIhIIIIIIIIIIIIIIIU:OFbPso0

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks