General

  • Target

    XClient.exe

  • Size

    37KB

  • Sample

    250306-bvvbmavn15

  • MD5

    f400327c2fa6ceb8ba39d523c545236b

  • SHA1

    ddea39f7f8e805d60ab9a13706340a2918e00262

  • SHA256

    09035e83909836e05a36d9788389e9234c52c1f038831d8eb1bea8a47d63fb74

  • SHA512

    df017269ef4296ecccc01a687bf3a8f09d96fe7c4e22dbd97a6ae04c6158447e1c74961e6baf9daca9cfce447019005fecf8e068cfef9c32476a263ea1628738

  • SSDEEP

    768:QF2nLAUuuaeKmxz3AXFyK9OiX66YOjhDPy8nzy:S0LA+aG7uF397K6YOjhNG

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:37010

countries-allowed.gl.at.ply.gg:37010

called-stainless.gl.at.ply.gg::37010

called-stainless.gl.at.ply.gg:37010

called-stainless.gl.at.ply.gg:37010:37010

Mutex

bN8R5mLl21egMeZl

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      37KB

    • MD5

      f400327c2fa6ceb8ba39d523c545236b

    • SHA1

      ddea39f7f8e805d60ab9a13706340a2918e00262

    • SHA256

      09035e83909836e05a36d9788389e9234c52c1f038831d8eb1bea8a47d63fb74

    • SHA512

      df017269ef4296ecccc01a687bf3a8f09d96fe7c4e22dbd97a6ae04c6158447e1c74961e6baf9daca9cfce447019005fecf8e068cfef9c32476a263ea1628738

    • SSDEEP

      768:QF2nLAUuuaeKmxz3AXFyK9OiX66YOjhDPy8nzy:S0LA+aG7uF397K6YOjhNG

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks