General

  • Target

    XWorm 5.6 Edition Cracked.zip

  • Size

    25.0MB

  • Sample

    240725-19a9qs1fnd

  • MD5

    057ed425caddf56452590f6b40e72a61

  • SHA1

    8ac1ff197432d8f04a08e421217de1ca1e44a0a0

  • SHA256

    29abcda84ffb413c142ff8f3aad3986030464f3ca2c959670b49527e697d621d

  • SHA512

    e8c718e7d2439d5daa03fa587c4db02d95c127e3e22c9a14ba135c64b0c39445fe401086df9520f5af5fd8b7ac11a6738e93334dae035d690e5d652f55b21ab6

  • SSDEEP

    786432:LyC3Xp1FGO4HoHhuh4WmhYP0G+736cSfe5XXlN0:53Xp1FJ4SfbYP0/7Kc9XXlN0

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

K8gQNnuQfSaMvyLt

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Xworm V5.6.exe

    • Size

      14.9MB

    • MD5

      56ccb739926a725e78a7acf9af52c4bb

    • SHA1

      5b01b90137871c3c8f0d04f510c4d56b23932cbc

    • SHA256

      90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405

    • SHA512

      2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1

    • SSDEEP

      196608:P4/BAe1d4ihvy85JhhYc3BSL1kehn4inje:PuyIhhkRka4i

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • AgentTesla payload

    • Executes dropped EXE

    • Uses the VBS compiler for execution

MITRE ATT&CK Enterprise v15

Tasks