General

  • Target

    XClient.exe

  • Size

    34KB

  • Sample

    250307-3zg1mszlx7

  • MD5

    606d9b179157736ea5acad71ad50c0c7

  • SHA1

    dd88b6e09b9be71fe98ee1fa76c5f14f5e9ef84c

  • SHA256

    80a2ae9b77c4eafc3da22fac6025b340793c2bdbfef7b061cdc88bdea330e11a

  • SHA512

    c81d9e0e6f28869f6618c2904d317eb113514db2685621c674c0697e76c187249fd50a365cf07f6972c2a43970b4081e470a18dc631ca74cd1f606307fcdd2c7

  • SSDEEP

    768:OtH6rNd7AtFPNhzIgtoFk9Fy9Yx/Ojhe/Vcg:OtuNJyF0gtowFy9Yx/OjItcg

Malware Config

Extracted

Family

xworm

Version

5.0

C2

MellowFishy-29478.portmap.host:29478

Mutex

k1tzVGcrL1gP53ej

Attributes
  • Install_directory

    %AppData%

  • install_file

    Realtek Audio Driver.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      34KB

    • MD5

      606d9b179157736ea5acad71ad50c0c7

    • SHA1

      dd88b6e09b9be71fe98ee1fa76c5f14f5e9ef84c

    • SHA256

      80a2ae9b77c4eafc3da22fac6025b340793c2bdbfef7b061cdc88bdea330e11a

    • SHA512

      c81d9e0e6f28869f6618c2904d317eb113514db2685621c674c0697e76c187249fd50a365cf07f6972c2a43970b4081e470a18dc631ca74cd1f606307fcdd2c7

    • SSDEEP

      768:OtH6rNd7AtFPNhzIgtoFk9Fy9Yx/Ojhe/Vcg:OtuNJyF0gtowFy9Yx/OjItcg

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Deletes itself

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks