General

  • Target

    cm-chat-media-video-1ed1d8e4b-814a-5abe-bf48-9183d87c3fae22700.mp4

  • Size

    354KB

  • Sample

    241019-gy24jatdlm

  • MD5

    20e7c30e0ae7351db59ebea7e922a944

  • SHA1

    3663755f85d76e11c8fd6e66945b5f2119b84c6d

  • SHA256

    00bfd28fd4ac55a7fd87527842dc892cea858282d880640fe10f3c8cdc4e56ee

  • SHA512

    efcfe5e10793ce9f77ef007c419ed3020417a0a69d642cfb7209d165e2d1afdab37cad183b6568f66edf80e270656f6559c3b8c255a58373b9ab37e88729971c

  • SSDEEP

    6144:PLa4UVZw8TSp9OPNf1msHcaC3kR+wRj+yfMoZ5/Ny8qwXnMtKzU9bJpUPAPfUy:PHU4oSp4NtxHT+Wq8vNswX+9bvmAPfUy

Malware Config

Extracted

Family

xworm

C2

join-ez.gl.at.ply.gg:27599

Attributes
  • Install_directory

    %AppData%

  • install_file

    WindowsUpdate.exe

Targets

    • Target

      cm-chat-media-video-1ed1d8e4b-814a-5abe-bf48-9183d87c3fae22700.mp4

    • Size

      354KB

    • MD5

      20e7c30e0ae7351db59ebea7e922a944

    • SHA1

      3663755f85d76e11c8fd6e66945b5f2119b84c6d

    • SHA256

      00bfd28fd4ac55a7fd87527842dc892cea858282d880640fe10f3c8cdc4e56ee

    • SHA512

      efcfe5e10793ce9f77ef007c419ed3020417a0a69d642cfb7209d165e2d1afdab37cad183b6568f66edf80e270656f6559c3b8c255a58373b9ab37e88729971c

    • SSDEEP

      6144:PLa4UVZw8TSp9OPNf1msHcaC3kR+wRj+yfMoZ5/Ny8qwXnMtKzU9bJpUPAPfUy:PHU4oSp4NtxHT+Wq8vNswX+9bvmAPfUy

    • Detect Xworm Payload

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks