General

  • Target

    upx.exe

  • Size

    69KB

  • Sample

    240514-d4wbdshg37

  • MD5

    a230d428e97911ce6959e1463d781257

  • SHA1

    0946c13059bf98fd3aacefd0b2681a42b95292cd

  • SHA256

    c8e088feb7de05c3852af588c1a440f61d06870a93b07a3c6b7e2c12c9d55b12

  • SHA512

    089f7f6e979729ba037a19510be160d1c407c712fa01614815ce2427ff6c8fe7fa80a2cb673a36611dc37734aba63f7c87832c3848ac9ce011343c0e15b7aa68

  • SSDEEP

    1536:KWEyI4XFyV0UUIRiZAkupj9bIu9uLhQSOIcoFqXgG:KWnIiyVxRiij9bIYYhdOBuqXz

Malware Config

Extracted

Family

xworm

C2

45.83.246.140:30120

Attributes
  • Install_directory

    %AppData%

  • install_file

    runtime.exe

Targets

    • Target

      upx.exe

    • Size

      69KB

    • MD5

      a230d428e97911ce6959e1463d781257

    • SHA1

      0946c13059bf98fd3aacefd0b2681a42b95292cd

    • SHA256

      c8e088feb7de05c3852af588c1a440f61d06870a93b07a3c6b7e2c12c9d55b12

    • SHA512

      089f7f6e979729ba037a19510be160d1c407c712fa01614815ce2427ff6c8fe7fa80a2cb673a36611dc37734aba63f7c87832c3848ac9ce011343c0e15b7aa68

    • SSDEEP

      1536:KWEyI4XFyV0UUIRiZAkupj9bIu9uLhQSOIcoFqXgG:KWnIiyVxRiij9bIYYhdOBuqXz

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks