General

  • Target

    e1f3e0bc705e2917d285f9a9ab49cc6444ff9267b46cbf1be3b97f9a716e6d08

  • Size

    65KB

  • Sample

    240319-xgyyjsbg86

  • MD5

    3b5926b1dca859fa1a51a103ab0fd068

  • SHA1

    9b41d9e1810454b00e12cc386e8e31fc1bd29ef6

  • SHA256

    e1f3e0bc705e2917d285f9a9ab49cc6444ff9267b46cbf1be3b97f9a716e6d08

  • SHA512

    6f924f3b1a7bcce36cea2ef0f73dfcf837b2ec03da44e0a12d6afcd2af1a92d20af251d04fd3970beedad082d646fc84ae7107b4111f43abc12b5a1e3d03a794

  • SSDEEP

    1536:ZIMnXMk2TGbTWt6Atr9OV2NPsHNOOImz:uMnXETGg6A99OUPsHNOYz

Score
10/10

Malware Config

Extracted

Family

xworm

C2

163.5.215.245:9049

Mutex

r3SLo8kx59hai6gX

aes.plain

Targets

    • Target

      e1f3e0bc705e2917d285f9a9ab49cc6444ff9267b46cbf1be3b97f9a716e6d08

    • Size

      65KB

    • MD5

      3b5926b1dca859fa1a51a103ab0fd068

    • SHA1

      9b41d9e1810454b00e12cc386e8e31fc1bd29ef6

    • SHA256

      e1f3e0bc705e2917d285f9a9ab49cc6444ff9267b46cbf1be3b97f9a716e6d08

    • SHA512

      6f924f3b1a7bcce36cea2ef0f73dfcf837b2ec03da44e0a12d6afcd2af1a92d20af251d04fd3970beedad082d646fc84ae7107b4111f43abc12b5a1e3d03a794

    • SSDEEP

      1536:ZIMnXMk2TGbTWt6Atr9OV2NPsHNOOImz:uMnXETGg6A99OUPsHNOYz

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks