General

  • Target

    3149ac1cd2f798f14c82e4eaa81b1853.bin

  • Size

    42KB

  • Sample

    240328-bnfvnaab87

  • MD5

    829200d665b4863bb7ab7db3edb808de

  • SHA1

    ce364d866478570c5e976f3dad6943448499d375

  • SHA256

    ec47a43f23434a144f9d5c10489a65c74027c465092c92694620f3b51cc4c123

  • SHA512

    f6b5cccbc2ba09484981c20b9bbae02d91cad8b8c520cecfdd3f766bce2462e39c6222977f709a9e58fc0f55c3a836e24d0346cd20308285820da516bc44ce3a

  • SSDEEP

    768:/df8zvYG3LSRcn0sI1HUVh+OAds+Owp5ZK8gEsOq0y44x3mhrw9gJItqL4Z:/V0gq+IpI1UVQO0bxpTsEsOqt3mhIjZ

Score
10/10

Malware Config

Extracted

Family

xworm

C2

win-britain.gl.at.ply.gg:55238

Attributes
  • Install_directory

    %AppData%

  • install_file

    testnt.exe

Targets

    • Target

      2391648221057ae4454b46e4010db00fa25551df4835c916ad1cf1354077234f.exe

    • Size

      70KB

    • MD5

      3149ac1cd2f798f14c82e4eaa81b1853

    • SHA1

      7939c17fc5433dcf060c2035bc035e5fefd33078

    • SHA256

      2391648221057ae4454b46e4010db00fa25551df4835c916ad1cf1354077234f

    • SHA512

      c584204b5287b1c25fa33e7551504b19e60b89e05bbfe660146da9a1a937e32107f3eb95db5e63377308aa481d478b5e1ccf5c543b95317672328adbc685ad9a

    • SSDEEP

      1536:1pOkU3DTMDMiAjp076sFiT/xXbC6gywEX3UUzGZDO2mvZRmD:1zUXMYd98QjxbC3I01O22SD

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks