General

  • Target

    Deadfr.exe

  • Size

    35KB

  • Sample

    241029-1xhs2sskam

  • MD5

    afc6766fb3b5e48943c754a41f8be1b7

  • SHA1

    a246d866914632b0dad6aa6c21fd979cbdb60345

  • SHA256

    b773c49a75d4b308c5409d9b9111b454849a8e4a8664b7b4e9c60ed0b0b7fa16

  • SHA512

    cf16457a2a1c7043f40b1e0fa982665a90bf2a72ff778f45fec85c48b6cdfd7ec4eafbf1b7bd413d6ca35239137367febf43defa09b7e227901ec267e3487e9d

  • SSDEEP

    384:TyqLXPCCbuGvSmKzJI9tTSULseqqUB7u5C36gYt9ORtpkFTBLT29pZwoJzVvNV4S:9LTXliB75qgDOFk9/LO/hH/jtYaY

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

WDNla7345HFEnugV

Attributes
  • Install_directory

    %Public%

  • install_file

    Dean.exe

  • pastebin_url

    https://pastebin.com/raw/J09JweeH

aes.plain

Targets

    • Target

      Deadfr.exe

    • Size

      35KB

    • MD5

      afc6766fb3b5e48943c754a41f8be1b7

    • SHA1

      a246d866914632b0dad6aa6c21fd979cbdb60345

    • SHA256

      b773c49a75d4b308c5409d9b9111b454849a8e4a8664b7b4e9c60ed0b0b7fa16

    • SHA512

      cf16457a2a1c7043f40b1e0fa982665a90bf2a72ff778f45fec85c48b6cdfd7ec4eafbf1b7bd413d6ca35239137367febf43defa09b7e227901ec267e3487e9d

    • SSDEEP

      384:TyqLXPCCbuGvSmKzJI9tTSULseqqUB7u5C36gYt9ORtpkFTBLT29pZwoJzVvNV4S:9LTXliB75qgDOFk9/LO/hH/jtYaY

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks