General

  • Target

    test.exe

  • Size

    34KB

  • Sample

    240525-2kyjeadf68

  • MD5

    e1f7cbb395ee3aece6b8749bf6aaa4a7

  • SHA1

    0d081adb293d89155c55dcedf7a0fb2188a27a92

  • SHA256

    f9855926bc7131cc3ce3cb5a4e4943f2048787296fd6dfd4d663457dcf511a9c

  • SHA512

    9e007c0c8668432a89ca4ed20d02ed1f707b0006183657e813a9fc5e26c173696e7e92e221e56f035451725492cfadf5fae6200cdad241c783055d6750b5a765

  • SSDEEP

    384:YIwDnjTJeDs3fL9bnfHIAxNFR2EguTOQRzpkFXBLT0OZwEJN2v99IkuisptlH6x7:S0D69DfHIAxNOsTlwFo9jDOjh/bk

Malware Config

Extracted

Family

xworm

Version

5.0

C2

tr3.localto.net:44953

Mutex

JAXr5VvuESQ7Hfoo

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot6919369290:AAGnnKr1Yo67mV9jYUriuVi-XAno2tdvbq0

aes.plain

Targets

    • Target

      test.exe

    • Size

      34KB

    • MD5

      e1f7cbb395ee3aece6b8749bf6aaa4a7

    • SHA1

      0d081adb293d89155c55dcedf7a0fb2188a27a92

    • SHA256

      f9855926bc7131cc3ce3cb5a4e4943f2048787296fd6dfd4d663457dcf511a9c

    • SHA512

      9e007c0c8668432a89ca4ed20d02ed1f707b0006183657e813a9fc5e26c173696e7e92e221e56f035451725492cfadf5fae6200cdad241c783055d6750b5a765

    • SSDEEP

      384:YIwDnjTJeDs3fL9bnfHIAxNFR2EguTOQRzpkFXBLT0OZwEJN2v99IkuisptlH6x7:S0D69DfHIAxNOsTlwFo9jDOjh/bk

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Impact

Defacement

1
T1491

Tasks