General

  • Target

    DDOS MACHINE.exe

  • Size

    246KB

  • Sample

    240818-zs6hwaxcjp

  • MD5

    3f4ac5ebf07ce3b4fbf7c53a99e9a95a

  • SHA1

    3fe8113fa02867e96b671916a1f64afd0652bb3f

  • SHA256

    4e2f315aec3cb1e8bc76424378ece6fa983d440b24d28863db91985f1adf4e7f

  • SHA512

    c1099c4874e90cc0aa571434b6d8681e08914eb9fc21d6b2ff55aa4a3c459e769dff29a4121f728f047a6b714d9adc7f8c9493aaccfeffe57e11321bb36bc7de

  • SSDEEP

    6144:gr9hCkZbhCFr+UhcX7elbKTua9bfF/H9d9n:gr9hCUE+3X3u+

Malware Config

Extracted

Family

xworm

C2

193.161.193.99:1194

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7359511930:AAFUm0iYhzGrRDo1gtea6bO9ZS8MYaGi__U/sendMessage?chat_id=6243944849

Targets

    • Target

      DDOS MACHINE.exe

    • Size

      246KB

    • MD5

      3f4ac5ebf07ce3b4fbf7c53a99e9a95a

    • SHA1

      3fe8113fa02867e96b671916a1f64afd0652bb3f

    • SHA256

      4e2f315aec3cb1e8bc76424378ece6fa983d440b24d28863db91985f1adf4e7f

    • SHA512

      c1099c4874e90cc0aa571434b6d8681e08914eb9fc21d6b2ff55aa4a3c459e769dff29a4121f728f047a6b714d9adc7f8c9493aaccfeffe57e11321bb36bc7de

    • SSDEEP

      6144:gr9hCkZbhCFr+UhcX7elbKTua9bfF/H9d9n:gr9hCUE+3X3u+

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks