General

  • Target

    executor.exe

  • Size

    39KB

  • Sample

    240328-p4r5hsef4s

  • MD5

    df7413a9c69f0ca5ec47c33fa9fa53fa

  • SHA1

    8a58c4ebc3ebac36eae3fbdcf7638517f16ddcad

  • SHA256

    b87c8da5eaca9c708b280facf43abec5b831a545e906e5fb82ac43156e2d5bd9

  • SHA512

    b00912effce93090fa39f8c95f34c8886ad51f6415c3d9ddac06dd7a4d142bebe96db4e4bad28bae6d878821f150c0b402653d4405d2a0daeb2387e510e450b2

  • SSDEEP

    768:ENT0Woe2NtEuyd2pwKuukU9fufFWPt92D6dOMhJal5:ENpo7LTkewKuungFe92D6dOMHG

Malware Config

Extracted

Family

xworm

Version

5.0

C2

does-moment.gl.at.ply.gg:6969

Mutex

kfa6Uh0lkhYVs2fG

Attributes
  • Install_directory

    %Public%

  • install_file

    Runtime Broker.exe

aes.plain

Targets

    • Target

      executor.exe

    • Size

      39KB

    • MD5

      df7413a9c69f0ca5ec47c33fa9fa53fa

    • SHA1

      8a58c4ebc3ebac36eae3fbdcf7638517f16ddcad

    • SHA256

      b87c8da5eaca9c708b280facf43abec5b831a545e906e5fb82ac43156e2d5bd9

    • SHA512

      b00912effce93090fa39f8c95f34c8886ad51f6415c3d9ddac06dd7a4d142bebe96db4e4bad28bae6d878821f150c0b402653d4405d2a0daeb2387e510e450b2

    • SSDEEP

      768:ENT0Woe2NtEuyd2pwKuukU9fufFWPt92D6dOMhJal5:ENpo7LTkewKuungFe92D6dOMHG

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks