General

  • Target

    XClient.exe

  • Size

    42KB

  • Sample

    250306-r7aqra1qy9

  • MD5

    f706e0fe7af5adbc7f6c8dc5d76f01ad

  • SHA1

    5d6612d70c227c72af49771ed2d197a427f413ec

  • SHA256

    abaa271934dad28dddcc5e065d4202b1bdc3ac18df824f4f770caa0bc80f8f2e

  • SHA512

    8ce649ae66f9fa32294ca7d67320034df598d07f5f10d9e6fbe2163f8e3419c3d78400b4c27adf5dd9662ac9da46e85db0955b10311f5fd3d1ea7a109a027d11

  • SSDEEP

    768:nTafJRPSlKImUO2DXFyp9ORM6YOjhAPyVGb:nTKJqI2TF09MM6YOjyJb

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

Idlerkik-51025.portmap.host:51025

Mutex

KUgHFqP88n6895bj

Attributes
  • Install_directory

    %AppData%

  • install_file

    svhost.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      42KB

    • MD5

      f706e0fe7af5adbc7f6c8dc5d76f01ad

    • SHA1

      5d6612d70c227c72af49771ed2d197a427f413ec

    • SHA256

      abaa271934dad28dddcc5e065d4202b1bdc3ac18df824f4f770caa0bc80f8f2e

    • SHA512

      8ce649ae66f9fa32294ca7d67320034df598d07f5f10d9e6fbe2163f8e3419c3d78400b4c27adf5dd9662ac9da46e85db0955b10311f5fd3d1ea7a109a027d11

    • SSDEEP

      768:nTafJRPSlKImUO2DXFyp9ORM6YOjhAPyVGb:nTKJqI2TF09MM6YOjyJb

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks