General

  • Target

    fd733056fe23c1d58de2178610834b5633dea41bd19f08063cff06a3732e9221

  • Size

    3.0MB

  • Sample

    240421-w812jsha92

  • MD5

    078bded0d7282b8b8daf4b40b837233a

  • SHA1

    526430046baebe7f7eb80960a1869718a142446e

  • SHA256

    fd733056fe23c1d58de2178610834b5633dea41bd19f08063cff06a3732e9221

  • SHA512

    a564806cb5ddb7523b8a3960a7414ced9463b0b67f118d6dd451ef63c17d316ef84d1b09968321faa5b3597b80616df301181bb17bcbc4604909de10e2ca6f54

  • SSDEEP

    12288:lY8PCpCfyF1PeDEAX3jekDqEUO8IrO69ZKY2z+d68PCpCfyF1c:lo94EO3jekDpkz+Ei

Score
10/10

Malware Config

Extracted

Family

xworm

C2

fuckurfeelins.anondns.net:3134

Mutex

kBLamnD4HGRDnT4g

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      fd733056fe23c1d58de2178610834b5633dea41bd19f08063cff06a3732e9221

    • Size

      3.0MB

    • MD5

      078bded0d7282b8b8daf4b40b837233a

    • SHA1

      526430046baebe7f7eb80960a1869718a142446e

    • SHA256

      fd733056fe23c1d58de2178610834b5633dea41bd19f08063cff06a3732e9221

    • SHA512

      a564806cb5ddb7523b8a3960a7414ced9463b0b67f118d6dd451ef63c17d316ef84d1b09968321faa5b3597b80616df301181bb17bcbc4604909de10e2ca6f54

    • SSDEEP

      12288:lY8PCpCfyF1PeDEAX3jekDqEUO8IrO69ZKY2z+d68PCpCfyF1c:lo94EO3jekDpkz+Ei

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks