General

  • Target

    Raven Tools.rar

  • Size

    71KB

  • Sample

    230702-t2rhesca65

  • MD5

    915a2f4033bc591e17e189c114250319

  • SHA1

    c23019cb04a5511b4a115ad505f2322913937f0b

  • SHA256

    efb842c17bea010e0b056d48d076e66c3ef742f4c7c546d12d36dc80b88bf149

  • SHA512

    206a067c890bfe1aae1f9cb6c1f341031edb5b9441c5630f75ffef40645a3289780c7f75821f6a25c3d6f0af91febae29090cafe36bc99ffa50e14b45e7d65e5

  • SSDEEP

    1536:iCnHag5SdayRxuI0aVTmIylGL1B6Q+YDaDQNoYlJwK0Z8:iCXsv3u0KKBOJ0u8

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Attributes
  • install_file

    USB.exe

Targets

    • Target

      Raven Tools/Raven Tools.exe

    • Size

      105KB

    • MD5

      2823fd1cfb783a1905eac437b0bb0bd0

    • SHA1

      81aa39cbb201c5ef8febaf9943501575a170abfe

    • SHA256

      b2b3089fbc8c17871abb47f248b487459f73c1944278da81bd64ca89fc5c24e1

    • SHA512

      88c2b2a6e9edf76922b45e645cb9486debf698df4034c17e8891fac2754d486f7c479b702d8a4e0947c55ba71ffd9406f4fb0edb5f1cf455ea2fa287b01f032f

    • SSDEEP

      1536:chIzRsPbIk/RV/ovahCX4Aps8bljMJIf6ShOIEpOZetiRpc5+i+qVQY:cSk/k9oAnbljMC6tpOZe0pinr2Y

    Score
    10/10
    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks