General

  • Target

    XClient.exe

  • Size

    36KB

  • Sample

    250308-qjyl8sxwbx

  • MD5

    4eb89d9dc076e9089a20600e0b375f65

  • SHA1

    a46b8ee79b7ed6ffbecd92d11bb89cd181169afb

  • SHA256

    1699df6d4bad9fa252c2669dfe399061678f160d5eed929a5bf89c8f6137e2a9

  • SHA512

    e622aed8eb005bd50747e0aaba92520ee59420fc02c5505c254cdce50f58a331ff978747a519d1b3b42131d24621661fa0e6ee5810252fd467acea2328447660

  • SSDEEP

    768:30sk9c0ocpnVnZFx60zFR9lmKOjhNn/+8f2:309+aJPFx3FR9lmKOjzm8+

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

york-beach.gl.at.ply.gg:48693

Mutex

UscZtPXW3Vgy0w0g

Attributes
  • Install_directory

    %AppData%

  • install_file

    Update.exe

aes.plain

Targets

    • Target

      XClient.exe

    • Size

      36KB

    • MD5

      4eb89d9dc076e9089a20600e0b375f65

    • SHA1

      a46b8ee79b7ed6ffbecd92d11bb89cd181169afb

    • SHA256

      1699df6d4bad9fa252c2669dfe399061678f160d5eed929a5bf89c8f6137e2a9

    • SHA512

      e622aed8eb005bd50747e0aaba92520ee59420fc02c5505c254cdce50f58a331ff978747a519d1b3b42131d24621661fa0e6ee5810252fd467acea2328447660

    • SSDEEP

      768:30sk9c0ocpnVnZFx60zFR9lmKOjhNn/+8f2:309+aJPFx3FR9lmKOjzm8+

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks