General

  • Target

    xca.exe

  • Size

    34KB

  • Sample

    240522-ps6hrsbg6y

  • MD5

    8dd9473d5ff5f35e8ce4e7a342dc7cc2

  • SHA1

    7c5f05be12ac1210e6fa74cb8eabf07eef4c2a6e

  • SHA256

    c8f435241ebb3fdbf35e327cd244e2091cc0f64481c6bf10eef182a7251ccb18

  • SHA512

    055609e83b2e5098bdc09243e35b2978f8be83bc374e5a45f6f8a7fc58a744b6050f8ad8b7092844a2a223975ff0db228549ed96467de4cf969b04859418bf72

  • SSDEEP

    768:jteHgjgARFWlaPMDVMpXgdGlA9Fg9unO/h5bh:xQERFaaUD+BgdeeFg9unO/H1

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

friends-analytical.gl.at.ply.gg:44471

Mutex

tVRra1TBzSVlClo8

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

aes.plain

Targets

    • Target

      xca.exe

    • Size

      34KB

    • MD5

      8dd9473d5ff5f35e8ce4e7a342dc7cc2

    • SHA1

      7c5f05be12ac1210e6fa74cb8eabf07eef4c2a6e

    • SHA256

      c8f435241ebb3fdbf35e327cd244e2091cc0f64481c6bf10eef182a7251ccb18

    • SHA512

      055609e83b2e5098bdc09243e35b2978f8be83bc374e5a45f6f8a7fc58a744b6050f8ad8b7092844a2a223975ff0db228549ed96467de4cf969b04859418bf72

    • SSDEEP

      768:jteHgjgARFWlaPMDVMpXgdGlA9Fg9unO/h5bh:xQERFaaUD+BgdeeFg9unO/H1

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks