General

  • Target

    op.exe

  • Size

    68KB

  • Sample

    240503-pxnthsff5v

  • MD5

    d4c021f050296c309b84059bafa41332

  • SHA1

    f0df37f5f880969fcbba1f4f7d9ab7cdb3e596c5

  • SHA256

    a615aece52e909040876d9f88984d4a60499f2604dc181acc69aa241dd1e1ed2

  • SHA512

    27be42f79cbbf0c8a81c5a2decd0a393e27b0459bff9ed7b5f9b926e93da5f096efbfa6f473525db1d3269795c174506f544866a82774a4d5948bd644bb3aea7

  • SSDEEP

    1536:LObri+HdUrMuOGw+btMvnz7W7jqwaeAdKO2mIJ/1h1:LOnxdPuTw+bavfw6QO2mIJf1

Score
10/10

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    dllhost.exe

  • telegram

    https://api.telegram.org/bot6840593734:AAGeMJswJHfSYYy4WpS8cypmpzA8wfWUYMg/sendMessage?chat_id=1330099235

Targets

    • Target

      op.exe

    • Size

      68KB

    • MD5

      d4c021f050296c309b84059bafa41332

    • SHA1

      f0df37f5f880969fcbba1f4f7d9ab7cdb3e596c5

    • SHA256

      a615aece52e909040876d9f88984d4a60499f2604dc181acc69aa241dd1e1ed2

    • SHA512

      27be42f79cbbf0c8a81c5a2decd0a393e27b0459bff9ed7b5f9b926e93da5f096efbfa6f473525db1d3269795c174506f544866a82774a4d5948bd644bb3aea7

    • SSDEEP

      1536:LObri+HdUrMuOGw+btMvnz7W7jqwaeAdKO2mIJ/1h1:LOnxdPuTw+bavfw6QO2mIJf1

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks