General

  • Target

    dad95c8cb48d889b6187ebb93746cf00_NeikiAnalytics.exe

  • Size

    130KB

  • Sample

    240608-t23kpaec29

  • MD5

    dad95c8cb48d889b6187ebb93746cf00

  • SHA1

    b3ea63ce4ac175204dcac3c2ce8e72368a2b7bd5

  • SHA256

    ecbc1cf70355d3adade6e3e5bf7b4f6bf6bf22afef5c54fb1e9dbc2a30aa3870

  • SHA512

    f755fa10c55e719fa2d1eb367d7166f81bc2c5589ecd8caab08b33076038b747d0155ed9682bb343e36f7b188bbb10916615f5c01a9172c8edebfd0429d1afd4

  • SSDEEP

    3072:8d99/pFE9j1OjwBz65/M6If+3Js+3JFkKeTnQ:8VE9/xBt25

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

expected-ordinance.gl.at.ply.gg:5252

Mutex

hv76CJJBZ6C4woAY

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      dad95c8cb48d889b6187ebb93746cf00_NeikiAnalytics.exe

    • Size

      130KB

    • MD5

      dad95c8cb48d889b6187ebb93746cf00

    • SHA1

      b3ea63ce4ac175204dcac3c2ce8e72368a2b7bd5

    • SHA256

      ecbc1cf70355d3adade6e3e5bf7b4f6bf6bf22afef5c54fb1e9dbc2a30aa3870

    • SHA512

      f755fa10c55e719fa2d1eb367d7166f81bc2c5589ecd8caab08b33076038b747d0155ed9682bb343e36f7b188bbb10916615f5c01a9172c8edebfd0429d1afd4

    • SSDEEP

      3072:8d99/pFE9j1OjwBz65/M6If+3Js+3JFkKeTnQ:8VE9/xBt25

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

MITRE ATT&CK Matrix

Tasks