General

  • Target

    NEAS.bL7Texe_JC.exe

  • Size

    61KB

  • Sample

    231006-znjhjsfh7v

  • MD5

    9ed8f212c10771fd7976c0524a3840e8

  • SHA1

    d528b7db179d7331823be2579763bd174f1fddad

  • SHA256

    cf479eb23e6252acce467b8cfc14182ac725659ef8fa5c28b9271a067756955c

  • SHA512

    fe861caefa195d95e43e4f4dd8e7445178fbc6c5b2cade93ed48c328e77ede2c6531080aa0c5fa115e46faa398b515b6b5ae6d1870eaf39b66a5a1a13b3dd8ad

  • SSDEEP

    1536:uIDPwg6BfvpHBglTZbY3nCea/LtFOTDsKQk:uogJphIZbyXatFOTgzk

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

C2

0.tcp.ap.ngrok.io:14440

Attributes
  • install_file

    USB.exe

Targets

    • Target

      NEAS.bL7Texe_JC.exe

    • Size

      61KB

    • MD5

      9ed8f212c10771fd7976c0524a3840e8

    • SHA1

      d528b7db179d7331823be2579763bd174f1fddad

    • SHA256

      cf479eb23e6252acce467b8cfc14182ac725659ef8fa5c28b9271a067756955c

    • SHA512

      fe861caefa195d95e43e4f4dd8e7445178fbc6c5b2cade93ed48c328e77ede2c6531080aa0c5fa115e46faa398b515b6b5ae6d1870eaf39b66a5a1a13b3dd8ad

    • SSDEEP

      1536:uIDPwg6BfvpHBglTZbY3nCea/LtFOTDsKQk:uogJphIZbyXatFOTgzk

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks