General

  • Target

    7973fcb627c7c8558c7aaf62ec80f24e29a106d9ea7fe2e2fbcf71a5f1a19e43N

  • Size

    271KB

  • Sample

    240921-gwrj1syckn

  • MD5

    776f1ab7d2bb8807a424d6947f299e30

  • SHA1

    508297113c75884fdf374b8aa9eb74f92e5a0cbe

  • SHA256

    7973fcb627c7c8558c7aaf62ec80f24e29a106d9ea7fe2e2fbcf71a5f1a19e43

  • SHA512

    2237fdd9bf1644c9b684c26c3042e423de8bfcfe4b3c171b4a8e5cba35de5934393d60e33432f45aa1385e4050227a7ba4912c6e6e3151a0d8c9527495c44679

  • SSDEEP

    6144:uutkz7bbo7e7i99999Yki76sNV6/68/27ySQPLL:OL4e7i99999Yki76skPLL

Malware Config

Extracted

Family

xworm

C2

91.166.206.112:39575

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      7973fcb627c7c8558c7aaf62ec80f24e29a106d9ea7fe2e2fbcf71a5f1a19e43N

    • Size

      271KB

    • MD5

      776f1ab7d2bb8807a424d6947f299e30

    • SHA1

      508297113c75884fdf374b8aa9eb74f92e5a0cbe

    • SHA256

      7973fcb627c7c8558c7aaf62ec80f24e29a106d9ea7fe2e2fbcf71a5f1a19e43

    • SHA512

      2237fdd9bf1644c9b684c26c3042e423de8bfcfe4b3c171b4a8e5cba35de5934393d60e33432f45aa1385e4050227a7ba4912c6e6e3151a0d8c9527495c44679

    • SSDEEP

      6144:uutkz7bbo7e7i99999Yki76sNV6/68/27ySQPLL:OL4e7i99999Yki76skPLL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks