General

  • Target

    VYPR.exe

  • Size

    194KB

  • Sample

    240928-rgxslazckr

  • MD5

    afdea2b053e6ff3a7094234cfe4b3d0a

  • SHA1

    9a5793655e222cf920d66826ecb351fbf52e57de

  • SHA256

    191d3186f110cb961ae766ece4161b815d8aca115dcca43930cef1f1f57b7e24

  • SHA512

    6867ee5d0ccb72ea6d6ab32e735237616834437893cf2d5fb0d412488d335d03d9ad49143874a389dac1365ad4d21c54604c01e2c6abb380be88dc2f61a2c3b4

  • SSDEEP

    3072:xdSXeO9JvVBPM7h1bOqgNfMIcflNUOe37BF8LKi:LxgJzPq1b0cfXUF8m

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Attributes
  • install_file

    USB.exe

Targets

    • Target

      VYPR.exe

    • Size

      194KB

    • MD5

      afdea2b053e6ff3a7094234cfe4b3d0a

    • SHA1

      9a5793655e222cf920d66826ecb351fbf52e57de

    • SHA256

      191d3186f110cb961ae766ece4161b815d8aca115dcca43930cef1f1f57b7e24

    • SHA512

      6867ee5d0ccb72ea6d6ab32e735237616834437893cf2d5fb0d412488d335d03d9ad49143874a389dac1365ad4d21c54604c01e2c6abb380be88dc2f61a2c3b4

    • SSDEEP

      3072:xdSXeO9JvVBPM7h1bOqgNfMIcflNUOe37BF8LKi:LxgJzPq1b0cfXUF8m

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks