General

  • Target

    shadow.exe

  • Size

    40KB

  • Sample

    230327-q2ks4afg6w

  • MD5

    4afda090eb6b598567ea78e107091de8

  • SHA1

    7552d66d51bc5f1be8a55e80bce3cb5af0460ce0

  • SHA256

    2351e582e18b9192f76ef1d887dd377cc2f794c6011ac98eed8d6a049352f864

  • SHA512

    4ddbb8798171d85654cc6aacabb159290ec4fd8862f67a47df1c620e661c1e7fbe15f2ac75fcb14ad1999750d1624dde7a1569d7a35be5b0f528143f8f3cca03

  • SSDEEP

    768:zfw749swluM7R1Acpo+I2tGcy97KdV2UiPNRSy:zs4iA7R1Atr2yOZgky

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Mutex

SMSuhNoQkgRxeqPg

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      shadow.exe

    • Size

      40KB

    • MD5

      4afda090eb6b598567ea78e107091de8

    • SHA1

      7552d66d51bc5f1be8a55e80bce3cb5af0460ce0

    • SHA256

      2351e582e18b9192f76ef1d887dd377cc2f794c6011ac98eed8d6a049352f864

    • SHA512

      4ddbb8798171d85654cc6aacabb159290ec4fd8862f67a47df1c620e661c1e7fbe15f2ac75fcb14ad1999750d1624dde7a1569d7a35be5b0f528143f8f3cca03

    • SSDEEP

      768:zfw749swluM7R1Acpo+I2tGcy97KdV2UiPNRSy:zs4iA7R1Atr2yOZgky

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks