User tags

Assigned on submission by the user, not by sandbox detections.

Threatview.io Proactive Hunter

General

  • Target

    hello.exe

  • Size

    133KB

  • Sample

    230709-pmeg4adf8s

  • MD5

    27d43df9fb6228ab9ec3482a528f1da6

  • SHA1

    23b938e1caf2507ae797805f27ee66357ee0c53a

  • SHA256

    d9048e7e5185fca63822a536674effaf47f434fd8bcd74018e5da09b5a7c1469

  • SHA512

    30fb0f42d85b92102ac83dde0cadb0cdf1f19f2bafbb6174ce880aaf9c89a6dac201a3a461253543cac833fb12c5b10277bcf0c492eb2a0070e033b61ec632cc

  • SSDEEP

    1536:u7K22GZXoCVg0vfiCTzbec/31ENYw649ApO4uMET1qxj751cNz0UCdkV/L7t:u7Kh+4CO0vfiC/beGCNYi9ApOZUH5aJ

Malware Config

Extracted

Family

xworm

C2

needforrat.hopto.org:7000

Attributes
  • install_file

    USB.exe

Targets

    • Target

      hello.exe

    • Size

      133KB

    • MD5

      27d43df9fb6228ab9ec3482a528f1da6

    • SHA1

      23b938e1caf2507ae797805f27ee66357ee0c53a

    • SHA256

      d9048e7e5185fca63822a536674effaf47f434fd8bcd74018e5da09b5a7c1469

    • SHA512

      30fb0f42d85b92102ac83dde0cadb0cdf1f19f2bafbb6174ce880aaf9c89a6dac201a3a461253543cac833fb12c5b10277bcf0c492eb2a0070e033b61ec632cc

    • SSDEEP

      1536:u7K22GZXoCVg0vfiCTzbec/31ENYw649ApO4uMET1qxj751cNz0UCdkV/L7t:u7Kh+4CO0vfiC/beGCNYi9ApOZUH5aJ

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks