General

  • Target

    drivers.exe

  • Size

    67KB

  • Sample

    240927-qgpxbatgkm

  • MD5

    f663ded3216427a6277c5da3831dab1e

  • SHA1

    2a8a5995ecbf2d5bf1c81a32ee637c2e44e2938d

  • SHA256

    26084a9f86b27b3d1853c2921d9eb46f1cff88baf52a38375021a3c65622c370

  • SHA512

    002e2d558338fcc96ba022f5239e65b8d839dcd755e10ffd7bba3ef6e794d7593344587267ee1054b0a34d16a4278f89e877b7befc4ead6cc83e1dd134b99a02

  • SSDEEP

    1536:SGt7jMPfimfLU+ZJeBb+kzTCNOg1eKRRq:SXTU+jeBb+2TiOg1Dq

Score
10/10

Malware Config

Extracted

Family

xworm

C2

who-nat.gl.at.ply.gg:61669

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    yandex.exe

Targets

    • Target

      drivers.exe

    • Size

      67KB

    • MD5

      f663ded3216427a6277c5da3831dab1e

    • SHA1

      2a8a5995ecbf2d5bf1c81a32ee637c2e44e2938d

    • SHA256

      26084a9f86b27b3d1853c2921d9eb46f1cff88baf52a38375021a3c65622c370

    • SHA512

      002e2d558338fcc96ba022f5239e65b8d839dcd755e10ffd7bba3ef6e794d7593344587267ee1054b0a34d16a4278f89e877b7befc4ead6cc83e1dd134b99a02

    • SSDEEP

      1536:SGt7jMPfimfLU+ZJeBb+kzTCNOg1eKRRq:SXTU+jeBb+2TiOg1Dq

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks