General

  • Target

    XWorm_v5.6_Edition.rar

  • Size

    22.0MB

  • Sample

    240711-mb7ndsvcma

  • MD5

    e507ace7818139e1958dd125558fa537

  • SHA1

    a60b68bfcdaf26f783216665d75872e9f9608000

  • SHA256

    69cc2a01c58024d4636306daa5aeb3ae73ed828f0db0cded3f445927490677e9

  • SHA512

    6268c253ccd5c2726e9e5c6dd7a5dc03570889e1d329f2ae23080696a28f5f215202ed2717478c4de5954017eb982409ff4e041a1e21e3a0ae6c2f965faad1f7

  • SSDEEP

    393216:xkY1HmfIGGd1RiOrUmIlGokw+/jyZAgeOf9fEHgVhQpUdaQ9Fdd:xJEAGGRiSzGGpn/GAg5fiAjjdVd

Malware Config

Targets

    • Target

      XWorm_v5.6_Edition.rar

    • Size

      22.0MB

    • MD5

      e507ace7818139e1958dd125558fa537

    • SHA1

      a60b68bfcdaf26f783216665d75872e9f9608000

    • SHA256

      69cc2a01c58024d4636306daa5aeb3ae73ed828f0db0cded3f445927490677e9

    • SHA512

      6268c253ccd5c2726e9e5c6dd7a5dc03570889e1d329f2ae23080696a28f5f215202ed2717478c4de5954017eb982409ff4e041a1e21e3a0ae6c2f965faad1f7

    • SSDEEP

      393216:xkY1HmfIGGd1RiOrUmIlGokw+/jyZAgeOf9fEHgVhQpUdaQ9Fdd:xJEAGGRiSzGGpn/GAg5fiAjjdVd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks