General

  • Target

    1dc12b7529e0f04e870bc5c2aa78f053f2a0602a291ee5401ca4db11fbf6b9bc.exe

  • Size

    766KB

  • Sample

    240516-bfsjgsdd64

  • MD5

    b808d5b7433f2f77bdbf5fd5df203ec9

  • SHA1

    5a9c635489b3fecd8d9ecbaa557244df8338c762

  • SHA256

    1dc12b7529e0f04e870bc5c2aa78f053f2a0602a291ee5401ca4db11fbf6b9bc

  • SHA512

    7a9a2c058d50fc9e60ec71698e284607ac8b38942b69bb60792d4346937b5daa32ecb03aef02e694c66bc20934ab9ac40c91cb87a3fa509863b98e71dacbf266

  • SSDEEP

    12288:Mdzd+m39dkAf5YSyBThO6QglvZUXI/KhrlpAYxylfB/VL1Fb91J36HAgVU:MdhkszyqFglRGI4rfAFlfB/Z9f+R6

Malware Config

Extracted

Family

xworm

Version

5.0

C2

zafa02.hopto.org:4545

Mutex

KecGg5CGEilLm2a5

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      1dc12b7529e0f04e870bc5c2aa78f053f2a0602a291ee5401ca4db11fbf6b9bc.exe

    • Size

      766KB

    • MD5

      b808d5b7433f2f77bdbf5fd5df203ec9

    • SHA1

      5a9c635489b3fecd8d9ecbaa557244df8338c762

    • SHA256

      1dc12b7529e0f04e870bc5c2aa78f053f2a0602a291ee5401ca4db11fbf6b9bc

    • SHA512

      7a9a2c058d50fc9e60ec71698e284607ac8b38942b69bb60792d4346937b5daa32ecb03aef02e694c66bc20934ab9ac40c91cb87a3fa509863b98e71dacbf266

    • SSDEEP

      12288:Mdzd+m39dkAf5YSyBThO6QglvZUXI/KhrlpAYxylfB/VL1Fb91J36HAgVU:MdhkszyqFglRGI4rfAFlfB/Z9f+R6

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects executables packed with or use KoiVM

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks