General

  • Target

    RECODE 1.4.exe

  • Size

    326KB

  • Sample

    240420-xn68hafh81

  • MD5

    fb2bf1f855b1aaff5d2d75b6ff48ec89

  • SHA1

    318f3ad4db3aef7e617f1e262b3669214ae7fb3b

  • SHA256

    73c98ac5911fd4f4ab09fc5361c34292a69ea3f528cc5b26f620efe4bbf3ddd2

  • SHA512

    c1b9dc09ff20cf6fd3268c6764157e55daf49e4fe6dccff19fbfbe1d8f2de876ea3395560341629a1459336ddfca445bd5d9739355eb9acb1538bf96d3ae53de

  • SSDEEP

    6144:x1nbyCFfLZz+GIIIIIIIhIIIIIIIIIIIIIIIU:iILZU

Score
10/10

Malware Config

Extracted

Family

xworm

C2

safe-towers.gl.at.ply.gg:30351

Attributes
  • install_file

    USB.exe

Targets

    • Target

      RECODE 1.4.exe

    • Size

      326KB

    • MD5

      fb2bf1f855b1aaff5d2d75b6ff48ec89

    • SHA1

      318f3ad4db3aef7e617f1e262b3669214ae7fb3b

    • SHA256

      73c98ac5911fd4f4ab09fc5361c34292a69ea3f528cc5b26f620efe4bbf3ddd2

    • SHA512

      c1b9dc09ff20cf6fd3268c6764157e55daf49e4fe6dccff19fbfbe1d8f2de876ea3395560341629a1459336ddfca445bd5d9739355eb9acb1538bf96d3ae53de

    • SSDEEP

      6144:x1nbyCFfLZz+GIIIIIIIhIIIIIIIIIIIIIIIU:iILZU

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks