General

  • Target

    XClient.exe

  • Size

    72KB

  • Sample

    250304-q95hgasnv7

  • MD5

    15f74e14febfd737f68a48ab7ce58e84

  • SHA1

    50ecde07de7aaa79821f68f1ddf29c856981ac76

  • SHA256

    39f4f4ada4e89a0d825d16d021bd5a369f938bfc15c034765e3e51265a0c13ea

  • SHA512

    08a36014ef4016d4d0bd638e85a8229fe5121e1b037a7764bb64d66fcd393d251390ca5f0930ea2337013019880d967a3811260f2ef146719e5c944f4700d5e5

  • SSDEEP

    1536:CQNBCgR59ubFHFISnb+7ppbhNzaCzjI8MZHB6nQpOvWx9N:jNAIubFHFlqbhN73GOvWfN

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:41701

equipment-rep.gl.at.ply.gg:41701

Attributes
  • Install_directory

    %AppData%

  • install_file

    Runtime Broker.exe

Targets

    • Target

      XClient.exe

    • Size

      72KB

    • MD5

      15f74e14febfd737f68a48ab7ce58e84

    • SHA1

      50ecde07de7aaa79821f68f1ddf29c856981ac76

    • SHA256

      39f4f4ada4e89a0d825d16d021bd5a369f938bfc15c034765e3e51265a0c13ea

    • SHA512

      08a36014ef4016d4d0bd638e85a8229fe5121e1b037a7764bb64d66fcd393d251390ca5f0930ea2337013019880d967a3811260f2ef146719e5c944f4700d5e5

    • SSDEEP

      1536:CQNBCgR59ubFHFISnb+7ppbhNzaCzjI8MZHB6nQpOvWx9N:jNAIubFHFlqbhN73GOvWfN

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks