General

  • Target

    Steam.exe

  • Size

    300KB

  • Sample

    240719-rtl7mayhjf

  • MD5

    0dbaccc9c83071046e7a7b1c5abc0610

  • SHA1

    62dde7edace3b8dabc2181f8db9012e42c74724c

  • SHA256

    b60366dfa799f86b4f07d136d0b7779176fb057e04262435c3ef83478987d451

  • SHA512

    ab454858c86a5dbbd95c951b94c66f21e17dcf16f99d0a9bc1c1447485d42119e1759f5412697a4a61143beab274809b77749c4524c54162bc7e0f46ef220f7e

  • SSDEEP

    3072:G+BKtFU9CHOjQAZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ+ZZZZZZZZZZZZZZ8:GtU98+GIIIIIIIhIIIIIIIIIIIIIIIU

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

decision-published.gl.at.ply.gg:3901

Mutex

Fbub7FdLoEHtTFgW

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Steam.exe

    • Size

      300KB

    • MD5

      0dbaccc9c83071046e7a7b1c5abc0610

    • SHA1

      62dde7edace3b8dabc2181f8db9012e42c74724c

    • SHA256

      b60366dfa799f86b4f07d136d0b7779176fb057e04262435c3ef83478987d451

    • SHA512

      ab454858c86a5dbbd95c951b94c66f21e17dcf16f99d0a9bc1c1447485d42119e1759f5412697a4a61143beab274809b77749c4524c54162bc7e0f46ef220f7e

    • SSDEEP

      3072:G+BKtFU9CHOjQAZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ+ZZZZZZZZZZZZZZ8:GtU98+GIIIIIIIhIIIIIIIIIIIIIIIU

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks