General

  • Target

    08062024_0636_07062024_FV-2-15288.rar

  • Size

    122KB

  • Sample

    240608-hcx35ahg7z

  • MD5

    12245870913303a3c71e3215e7470a2c

  • SHA1

    cbddba95d91b27706edbaae05000897dd530cf28

  • SHA256

    339a961d654604c5253af9a1ec83672a3d0f7874d368a5757ab19a3ddbaf2a11

  • SHA512

    a8218c7e5ed1a725995a33a782d9182c227ca76e26223b1c015b1e4ddf9a93a6d397e8bb9d200659d9ad128cdadc3c98d18ec8be49cffc4cfdb7c4a3edd2ccf4

  • SSDEEP

    3072:UwvQBXAlBrw0S07KBQ9jbLi0T+yDOW+yV1PmvPkj:jeX4BrwGWy9jbO0h9+hXA

Malware Config

Extracted

Family

xworm

Version

5.0

C2

ivmsgauzt84tgksuw6an6cht0am8iiux0jz.duckdns.org:7772

Mutex

CBNxQlZF6Bvs1OlD

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      FV-2-15288.bat

    • Size

      161KB

    • MD5

      416aff758a2a587d89b208f7dabdb0ec

    • SHA1

      7e908dee1cfc2885d688d8c0e9c03e88b66ea090

    • SHA256

      897b124a4ef0a2886f3604babd1716017ac19577b5d74abca068ad24b21da4d6

    • SHA512

      8b66d8193011d207d9b24b0a20b76e2099bd3bbaea47d0797faba7a6f9741cae95dc3d4d69943aaad7df882e10299dbdfc49d1325fd30c1128ecfd23a0474a46

    • SSDEEP

      3072:oJl6l20lITvp1WNt4HkboG2vIbuoTkDa+P0o5l1MzFpiP5cNttn:oJl6w0FNt4Hk+gbTy/P0obPSNttn

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Tasks