General

  • Target

    WaveCrackedDMP.exe

  • Size

    73KB

  • Sample

    241003-q9n6gsscld

  • MD5

    ce4f1a100fd681cfe3d3c9d1b2796f7f

  • SHA1

    fff7ebb099769718af77eb88d20e0a2a643f81fa

  • SHA256

    1aa182ba676ff52db9e4ee9aec4240daf43d3d2db8ed7b2f5c321d14a32167f6

  • SHA512

    fcb297232aa4929e59d1625a0cbd9d840a3858c412e2eb590917f381acd81534d864841bbe5a941504706203411719cd1e52a4290d7cf76a0ffbc68040595803

  • SSDEEP

    1536:tC9LgfUnFsz21dO4tY6KHvc+bPU2USzhO3vvw2j:tC9LsUnJ14bE+bcFS1OH/j

Malware Config

Extracted

Family

xworm

C2

thread-advanced.gl.at.ply.gg:4794

Attributes
  • Install_directory

    %AppData%

  • install_file

    WaveCrackDMP.exe

Targets

    • Target

      WaveCrackedDMP.exe

    • Size

      73KB

    • MD5

      ce4f1a100fd681cfe3d3c9d1b2796f7f

    • SHA1

      fff7ebb099769718af77eb88d20e0a2a643f81fa

    • SHA256

      1aa182ba676ff52db9e4ee9aec4240daf43d3d2db8ed7b2f5c321d14a32167f6

    • SHA512

      fcb297232aa4929e59d1625a0cbd9d840a3858c412e2eb590917f381acd81534d864841bbe5a941504706203411719cd1e52a4290d7cf76a0ffbc68040595803

    • SSDEEP

      1536:tC9LgfUnFsz21dO4tY6KHvc+bPU2USzhO3vvw2j:tC9LsUnJ14bE+bcFS1OH/j

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks