General

  • Target

    0x000800000001227e-5.dat

  • Size

    73KB

  • Sample

    241031-xn2b9asfrq

  • MD5

    06df71794e08473f20b46aa17c389269

  • SHA1

    149aaa1816a59e05d55806ec88adb75e7ccf079a

  • SHA256

    c0d08afc1dbcf3572160019c5074e5c58010205d158c9b2da1b2b7e86a465321

  • SHA512

    f772aab2f848914e19bb6061a52fdaf3da2ccd5d3baabd6ed99c52edc73cdafc6fc0bbcd91e9cb17083da51bcba1f4f5b8a5005531141ce0c04d414aa0b018b0

  • SSDEEP

    1536:HaHqQf1yZabIdVLqYgIHW+bpPSsS+CYyvOXOTuQ8EsL3b:6KQffIqvp+bB25YyvOeTuQ8E+b

Malware Config

Extracted

Family

xworm

C2

nohicsq.localto.net:3985

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      0x000800000001227e-5.dat

    • Size

      73KB

    • MD5

      06df71794e08473f20b46aa17c389269

    • SHA1

      149aaa1816a59e05d55806ec88adb75e7ccf079a

    • SHA256

      c0d08afc1dbcf3572160019c5074e5c58010205d158c9b2da1b2b7e86a465321

    • SHA512

      f772aab2f848914e19bb6061a52fdaf3da2ccd5d3baabd6ed99c52edc73cdafc6fc0bbcd91e9cb17083da51bcba1f4f5b8a5005531141ce0c04d414aa0b018b0

    • SSDEEP

      1536:HaHqQf1yZabIdVLqYgIHW+bpPSsS+CYyvOXOTuQ8EsL3b:6KQffIqvp+bB25YyvOeTuQ8E+b

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks