General

  • Target

    X-Worm-V5-main.zip

  • Size

    38.2MB

  • Sample

    240326-167hrsdg77

  • MD5

    43ec213ae2f483ad0571615217a015f5

  • SHA1

    3249d4183d62599ee7352261af8c9f9fbfc41cab

  • SHA256

    61bad8d96f17bc5e303a42e6fb63aa90dacec97a90aa2bf7bfebdee5d7f969eb

  • SHA512

    e590d60c4ea504816c611f0417d72622fec2e8a496da2b61e31911e6bed82f5765501907e806b35dd4b28d7c759d9b8294cb462a84997bb8e984a7acd866350f

  • SSDEEP

    786432:jyIjkDNnx2+2NYTb4opWJ2E0R53QVnGajZAS/VNEEgrWpngLHYdXyXJW:TkDNnxV2iTb4mVE0RpsgUNBC+oSO8

Malware Config

Targets

    • Target

      X-Worm-V5-main/XWorm V5.0/XWorm V5.0.exe

    • Size

      10.4MB

    • MD5

      227494b22a4ee99f48a269c362fd5f19

    • SHA1

      d32d08cf93d7f9450aee7e1e6c39d9d83b9a35c9

    • SHA256

      7471ff7818da2e044caf5bd89725b6283ed0304453c18a0490d6341f3a010ca2

    • SHA512

      71070e6b8042fa262ce12721e6c09104aec0a61ac0d6022f59f838077109b9476a5c1f8409242d93888eff6d36f0ee76337481fefe6f05e0f1243efbf350bee0

    • SSDEEP

      196608:z59nhcOWSxxgQHl2np1eY5J5itQaZWtU8i/MJ:zRRWQBQnpji1W+8i/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Target

      X-Worm-V5-main/XWorm V5.0/XWormLoader.exe

    • Size

      8.6MB

    • MD5

      2aff4d1edefd1017408f77bbf15ef6c2

    • SHA1

      cfc1827c2e45802cbfe931ab66dea427c512a6ab

    • SHA256

      7de8a4b7288fe71fdb8fa2eb453059937ce5ff998e117dc79c8d68de7e0f9315

    • SHA512

      a456dba519592187461596f0ceb1e008e0a9a974a79698acda5bb1cfe000b99fd1bcafe140a022a40db6b447cb70e335dba137500a4f05e68299a3da758f9756

    • SSDEEP

      196608:6HwveWmitDQXAWhg8tlFPreKofxWJHVP3u8CkXt0rQMJB4Eo:IkmitD85hgAtop81Hh0sUBk

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks