General

  • Target

    XD spoofer 2.exe

  • Size

    301KB

  • Sample

    240315-zqhc9sbc3y

  • MD5

    12aa7e5d2417b27a76f622f3932d28ab

  • SHA1

    3392c82e43ce556e952c9dd2aeaa724bb71ac28f

  • SHA256

    82e8978405208afa5ff71b4d038f21aa8d82369a2361a8b2ef5f50756488d295

  • SHA512

    d10c3ea5c37bf9b2bcb70635bafd0638905ca038d2e971bc8adc2d37ac0be6ed436cb7712b2d697d03cd1cb97aaa4412d331407bcef8c287fe62a95406de43c7

  • SSDEEP

    3072:CC6K8EQZlhObHDIPiULMWM9iQkyQ6OquEfZJmMq0utJFU9r21BYb/xH9coCQXOQ2:C7jORitJcOMuQAPg1eLxexu9bpt6DQ

Malware Config

Extracted

Family

xworm

Version

5.0

aes.plain

Targets

    • Target

      XD spoofer 2.exe

    • Size

      301KB

    • MD5

      12aa7e5d2417b27a76f622f3932d28ab

    • SHA1

      3392c82e43ce556e952c9dd2aeaa724bb71ac28f

    • SHA256

      82e8978405208afa5ff71b4d038f21aa8d82369a2361a8b2ef5f50756488d295

    • SHA512

      d10c3ea5c37bf9b2bcb70635bafd0638905ca038d2e971bc8adc2d37ac0be6ed436cb7712b2d697d03cd1cb97aaa4412d331407bcef8c287fe62a95406de43c7

    • SSDEEP

      3072:CC6K8EQZlhObHDIPiULMWM9iQkyQ6OquEfZJmMq0utJFU9r21BYb/xH9coCQXOQ2:C7jORitJcOMuQAPg1eLxexu9bpt6DQ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks