General

  • Target

    42ca144560a4c7cc6a244324a400014e7d6ee2f3b51f1a1f9183d460dccb7c6c.exe

  • Size

    75KB

  • Sample

    240909-sww1aavgll

  • MD5

    dfaa793468029d35d6156dcfbfacf0d0

  • SHA1

    d753fc9470a6ffa5e801f445f6d6ccb70d37da17

  • SHA256

    42ca144560a4c7cc6a244324a400014e7d6ee2f3b51f1a1f9183d460dccb7c6c

  • SHA512

    744d3fc0c5ea16d3a0da5bc3d6b9688ad997ec8fbe6442bc21df60b3dfdbb4ca3b642fda8cf851c578545249f8284543d170080b89a150e043c5196235253761

  • SSDEEP

    1536:FPmYE7E89MLYhht2wPbRwgdCFxy181i+TGhOKAQLj:Zkj9Pbyry1ItTOOKN

Malware Config

Extracted

Family

xworm

C2

nature-homeless.gl.at.ply.gg:41038

Attributes
  • Install_directory

    %AppData%

  • install_file

    Yandex.exe

Targets

    • Target

      42ca144560a4c7cc6a244324a400014e7d6ee2f3b51f1a1f9183d460dccb7c6c.exe

    • Size

      75KB

    • MD5

      dfaa793468029d35d6156dcfbfacf0d0

    • SHA1

      d753fc9470a6ffa5e801f445f6d6ccb70d37da17

    • SHA256

      42ca144560a4c7cc6a244324a400014e7d6ee2f3b51f1a1f9183d460dccb7c6c

    • SHA512

      744d3fc0c5ea16d3a0da5bc3d6b9688ad997ec8fbe6442bc21df60b3dfdbb4ca3b642fda8cf851c578545249f8284543d170080b89a150e043c5196235253761

    • SSDEEP

      1536:FPmYE7E89MLYhht2wPbRwgdCFxy181i+TGhOKAQLj:Zkj9Pbyry1ItTOOKN

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks