General

  • Target

    4df93d81835ebe38c0cc5e7ff06c5edbb04993e05bb8792866272d022596ad8e.bin

  • Size

    19KB

  • Sample

    220126-szlcyseegj

  • MD5

    8cdf4af6c295da278178651186da9347

  • SHA1

    4edd98af3bb46ad5484f97c2470d8ec2a53018ab

  • SHA256

    4df93d81835ebe38c0cc5e7ff06c5edbb04993e05bb8792866272d022596ad8e

  • SHA512

    d8cbffd7aea77a7ce4554f5d72c29a15ab608dd06e481fce161ea9cfa5f91e5e1a9682827f0dc41a22e374ccf09ff8c6b2792eb8ad67575b00d11cff0d4f6b90

Score
10/10

Malware Config

Extracted

Family

nworm

Version

v0.3.8

C2

24.101.169.101:4782

192.168.1.20:4782

Mutex

85224873

Targets

    • Target

      4df93d81835ebe38c0cc5e7ff06c5edbb04993e05bb8792866272d022596ad8e.bin

    • Size

      19KB

    • MD5

      8cdf4af6c295da278178651186da9347

    • SHA1

      4edd98af3bb46ad5484f97c2470d8ec2a53018ab

    • SHA256

      4df93d81835ebe38c0cc5e7ff06c5edbb04993e05bb8792866272d022596ad8e

    • SHA512

      d8cbffd7aea77a7ce4554f5d72c29a15ab608dd06e481fce161ea9cfa5f91e5e1a9682827f0dc41a22e374ccf09ff8c6b2792eb8ad67575b00d11cff0d4f6b90

    Score
    10/10
    • NWorm

      A TrickBot module used to propagate to vulnerable domain controllers.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks