General

  • Target

    Client.exe

  • Size

    42KB

  • Sample

    240913-1q5dga1bnn

  • MD5

    b6f93dde22b8e8afffc7b2e6095c5348

  • SHA1

    66e36a1a1c0f23e49b5a78ec7af677aecfef13a5

  • SHA256

    27fc1c692a00395486d1abab180fc844ab4d90b9265cfdd391297ef8f5becbe0

  • SHA512

    ee8b14eed0e80db08d6286feb6464a1990743110fcf981d3a93a43d8c238103a318e949ad6d00dbd687a43761edcfe823ea08580f8fe6675f9bbcc909f763b01

  • SSDEEP

    768:s7nkHPEt8r/X4Ap5tgkRT5QPYsQhLOakc:Cw48nH6M1O3c

Score
10/10

Malware Config

Extracted

Family

xworm

Version

2.2

C2

start-firms.gl.at.ply.gg:34357

Mutex

qDwhBDYzAnpR3g3T

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Client.exe

    • Size

      42KB

    • MD5

      b6f93dde22b8e8afffc7b2e6095c5348

    • SHA1

      66e36a1a1c0f23e49b5a78ec7af677aecfef13a5

    • SHA256

      27fc1c692a00395486d1abab180fc844ab4d90b9265cfdd391297ef8f5becbe0

    • SHA512

      ee8b14eed0e80db08d6286feb6464a1990743110fcf981d3a93a43d8c238103a318e949ad6d00dbd687a43761edcfe823ea08580f8fe6675f9bbcc909f763b01

    • SSDEEP

      768:s7nkHPEt8r/X4Ap5tgkRT5QPYsQhLOakc:Cw48nH6M1O3c

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks