General

  • Target

    3ede00f8296ef04596a6cc514b1809c3e83284edc94f4f7e6a921242aefeae19.ps1

  • Size

    13.0MB

  • Sample

    240428-bncs1acg62

  • MD5

    c93510116349ae9e7351554367f35aff

  • SHA1

    1af844f06676c3258df79cee3e224cc6d7b23a51

  • SHA256

    3ede00f8296ef04596a6cc514b1809c3e83284edc94f4f7e6a921242aefeae19

  • SHA512

    a2e81c5e0cc9880c74a287a75c3409640feea580c191cb8e4cba680ced5ac36d3b7f4ea9fd91802beaa60040997d20818a586eda8ebfc676b8b40d00f0a575f4

  • SSDEEP

    24576:re3FadN/VpN+28bCMCnzPNaBLhUboy9LpzXNEi8KwXIBnL8Plu2TbRxaO0kadoJv:51qZdpHlo7LyfG1JsxqtZwNwD5wPC

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

C2

nmds.duckdns.org:8895

Mutex

O3B5rRVaa3oX74CD

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      3ede00f8296ef04596a6cc514b1809c3e83284edc94f4f7e6a921242aefeae19.ps1

    • Size

      13.0MB

    • MD5

      c93510116349ae9e7351554367f35aff

    • SHA1

      1af844f06676c3258df79cee3e224cc6d7b23a51

    • SHA256

      3ede00f8296ef04596a6cc514b1809c3e83284edc94f4f7e6a921242aefeae19

    • SHA512

      a2e81c5e0cc9880c74a287a75c3409640feea580c191cb8e4cba680ced5ac36d3b7f4ea9fd91802beaa60040997d20818a586eda8ebfc676b8b40d00f0a575f4

    • SSDEEP

      24576:re3FadN/VpN+28bCMCnzPNaBLhUboy9LpzXNEi8KwXIBnL8Plu2TbRxaO0kadoJv:51qZdpHlo7LyfG1JsxqtZwNwD5wPC

    Score
    10/10
    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Detects Windows executables referencing non-Windows User-Agents

MITRE ATT&CK Matrix

Tasks