General

  • Target

    c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04.vbs

  • Size

    4KB

  • Sample

    240406-bz74aahb95

  • MD5

    22d736ac0bfacea4d23dbaf9412d329a

  • SHA1

    b2990e0c9f9549b1f8cc3dceec47663b975cbb36

  • SHA256

    c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04

  • SHA512

    bfdd54f8e400e9c516cf5c73f1ba17b2a5c44fe9d14ada37efaff35c38d30c7849ad1dfb32a3d877742631a60c462832e079994de5fe65044a2941eaa0770904

  • SSDEEP

    96:LQUUjcFSoSqUnPkPKOTK6yjbo+yHQUJ8fLGZ2k7:dYcFh5UsPKOTJcoLMw2k7

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

UxOlPOZZNwNV9srk

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/Dh8E7H3R

aes.plain

Targets

    • Target

      c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04.vbs

    • Size

      4KB

    • MD5

      22d736ac0bfacea4d23dbaf9412d329a

    • SHA1

      b2990e0c9f9549b1f8cc3dceec47663b975cbb36

    • SHA256

      c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04

    • SHA512

      bfdd54f8e400e9c516cf5c73f1ba17b2a5c44fe9d14ada37efaff35c38d30c7849ad1dfb32a3d877742631a60c462832e079994de5fe65044a2941eaa0770904

    • SSDEEP

      96:LQUUjcFSoSqUnPkPKOTK6yjbo+yHQUJ8fLGZ2k7:dYcFh5UsPKOTJcoLMw2k7

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Detects Windows executables referencing non-Windows User-Agents

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks