General

  • Target

    sample.cmd

  • Size

    82KB

  • Sample

    240522-a1rbgsfb41

  • MD5

    4ab6133a95c1cc4bf865b0eb5de71ee1

  • SHA1

    de046f1c2516b909e2582bf72c7bf03944350991

  • SHA256

    af741ad4ad174cdcbea9fcfaf76b68ba4ee38168b21248d5e9ce244ddf4073e3

  • SHA512

    9ce2883d993e3f26681194a7b14fd0b85a5886e68da55f6565b14d838f466ee62f24c575517aed3cc63cdcb56d773f49fa6f19d4e93c102d9f07e071578f2bdd

  • SSDEEP

    1536:gauHfl8HCHpbiyGGy+aq/ewn9utsxqdr3hyRLXrxHaq8AdIOGB:huHtoC2GFZGwn9utsCr3uxEMds

Malware Config

Extracted

Family

xworm

Version

5.0

C2

x5387400.duckdns.org:8896

Mutex

F4ssR8b386Bj6q2g

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      sample.cmd

    • Size

      82KB

    • MD5

      4ab6133a95c1cc4bf865b0eb5de71ee1

    • SHA1

      de046f1c2516b909e2582bf72c7bf03944350991

    • SHA256

      af741ad4ad174cdcbea9fcfaf76b68ba4ee38168b21248d5e9ce244ddf4073e3

    • SHA512

      9ce2883d993e3f26681194a7b14fd0b85a5886e68da55f6565b14d838f466ee62f24c575517aed3cc63cdcb56d773f49fa6f19d4e93c102d9f07e071578f2bdd

    • SSDEEP

      1536:gauHfl8HCHpbiyGGy+aq/ewn9utsxqdr3hyRLXrxHaq8AdIOGB:huHtoC2GFZGwn9utsCr3uxEMds

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks