General

  • Target

    202409191600d925862ef753288750008ec0517chiddentear

  • Size

    140KB

  • Sample

    240919-h11h6awgnd

  • MD5

    1600d925862ef753288750008ec0517c

  • SHA1

    19d690bb3bd6e9e2a4ae3704ed5eba5c6295996d

  • SHA256

    e0f8da5010a1162b1480daec57e3d2122a3f4fc7ab89797fb75536729f7fb7d7

  • SHA512

    4828feeb01daadd4f7f39a70814c6da727ca0f71a3e4a25b0ea9ddafc604d8ad2a1300c22490fc68ddd15eb325f99dba0e85a612e0ead4455af2f31116d218e7

  • SSDEEP

    3072:/esDcUBEg9YKM+lmsolAIrRuw+mqv9j1MWLQd:/ZBEg9o+lDAA

Malware Config

Extracted

Family

xworm

C2

week-media.gl.at.ply.gg:28685

Mutex

k1CSgYnNfhE66GJj

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      202409191600d925862ef753288750008ec0517chiddentear

    • Size

      140KB

    • MD5

      1600d925862ef753288750008ec0517c

    • SHA1

      19d690bb3bd6e9e2a4ae3704ed5eba5c6295996d

    • SHA256

      e0f8da5010a1162b1480daec57e3d2122a3f4fc7ab89797fb75536729f7fb7d7

    • SHA512

      4828feeb01daadd4f7f39a70814c6da727ca0f71a3e4a25b0ea9ddafc604d8ad2a1300c22490fc68ddd15eb325f99dba0e85a612e0ead4455af2f31116d218e7

    • SSDEEP

      3072:/esDcUBEg9YKM+lmsolAIrRuw+mqv9j1MWLQd:/ZBEg9o+lDAA

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks