General

  • Target

    Encrypted.exe

  • Size

    146KB

  • Sample

    240420-tc5zhscb64

  • MD5

    ba62310ba88bb596201603a2134a894f

  • SHA1

    fe72bc9e8fa174b563323455783a06223e9711da

  • SHA256

    46bc4e465bd527781235145ecd31222e49fb76497a73489a419c98672e50d477

  • SHA512

    0864e87635a1c411d5508cd572cceca066f28f5b7a9e1d99ff51fb57386f5ce74e4dd03d7d1ae408887f91bc8c10777c754510fd1228140eecc24d9b11fe1312

  • SSDEEP

    3072:8rKmgSAuR6q+0Cyt9eOVZPNN4nYW3AJ8G23FJgLDyfw:C3gSAAIZOfGYW3AJ8G23FJgLDU

Malware Config

Extracted

Family

xworm

Version

5.0

C2

h2cker.ddns.net:194

Mutex

QSawKB32BcwqRkbV

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Service.exe

aes.plain

Targets

    • Target

      Encrypted.exe

    • Size

      146KB

    • MD5

      ba62310ba88bb596201603a2134a894f

    • SHA1

      fe72bc9e8fa174b563323455783a06223e9711da

    • SHA256

      46bc4e465bd527781235145ecd31222e49fb76497a73489a419c98672e50d477

    • SHA512

      0864e87635a1c411d5508cd572cceca066f28f5b7a9e1d99ff51fb57386f5ce74e4dd03d7d1ae408887f91bc8c10777c754510fd1228140eecc24d9b11fe1312

    • SSDEEP

      3072:8rKmgSAuR6q+0Cyt9eOVZPNN4nYW3AJ8G23FJgLDyfw:C3gSAAIZOfGYW3AJ8G23FJgLDU

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks