General

  • Target

    true.exe

  • Size

    330KB

  • Sample

    240124-vwszqsecb9

  • MD5

    9c7e29c46aeea4af73bf5382f1b0bcf4

  • SHA1

    2568ab3b2dd12fdfa9e4b2cd788b97106df1071e

  • SHA256

    8599a5c62399e298ef5b855dc06d1163e3baaf8599520826af516c8ffd53bfb1

  • SHA512

    1cc7f710b203f03ab64ef563eb3093ccb2e2c8beb5ea565e153fed5093e3a0583c525b06b9a1154f31ebaaf848d1f575f7c5738b5d8b6ff44d3c544a0eb8bb81

  • SSDEEP

    3072:9sBTZQFLWx8MzI4IXoSuF/q9Q50t1YAQHmxqHd4HtMUsFTAG5bM:9sLQUxTI4IXo3F9GIGM2H2Us

Malware Config

Extracted

Family

xworm

Version

5.0

aes.plain

Targets

    • Target

      true.exe

    • Size

      330KB

    • MD5

      9c7e29c46aeea4af73bf5382f1b0bcf4

    • SHA1

      2568ab3b2dd12fdfa9e4b2cd788b97106df1071e

    • SHA256

      8599a5c62399e298ef5b855dc06d1163e3baaf8599520826af516c8ffd53bfb1

    • SHA512

      1cc7f710b203f03ab64ef563eb3093ccb2e2c8beb5ea565e153fed5093e3a0583c525b06b9a1154f31ebaaf848d1f575f7c5738b5d8b6ff44d3c544a0eb8bb81

    • SSDEEP

      3072:9sBTZQFLWx8MzI4IXoSuF/q9Q50t1YAQHmxqHd4HtMUsFTAG5bM:9sLQUxTI4IXo3F9GIGM2H2Us

    • An infostealer written in Python and packaged with PyInstaller.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • crealstealer

      An infostealer written in Python and packaged with PyInstaller.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks