General

  • Target

    0x000a0000000120d5-4.dat

  • Size

    63KB

  • Sample

    241101-wxpt5stdqf

  • MD5

    39476c74921658da58506252acd72f92

  • SHA1

    6b79e09a712dd56e8800ee191f18ead43ba7006a

  • SHA256

    26cab4dad2281e9683c56570546a1940d257ddafcc706af85d60975a4dd2bb65

  • SHA512

    20b43bdd535e9fee2bfc988f83c4cdb72def36631d57a0444f2dccc3f03e1e450655d8eca5555e21b76588bb6228a45a6ee238cb23e8eeffddff618ea379dabd

  • SSDEEP

    768:JfqXZWNJ3lDOVCfeMOYlzJCZH4OK8zg5z8Ja3DFqir+boZYrzoSSGxYlRYQEOVjk:JnVKQGGaHE8AZqK+bo+rzpxOJKTpVh

Malware Config

Extracted

Family

xworm

C2

0.tcp.in.ngrok.io:15792

Attributes
  • Install_directory

    %AppData%

  • install_file

    svсhost.exe

Targets

    • Target

      0x000a0000000120d5-4.dat

    • Size

      63KB

    • MD5

      39476c74921658da58506252acd72f92

    • SHA1

      6b79e09a712dd56e8800ee191f18ead43ba7006a

    • SHA256

      26cab4dad2281e9683c56570546a1940d257ddafcc706af85d60975a4dd2bb65

    • SHA512

      20b43bdd535e9fee2bfc988f83c4cdb72def36631d57a0444f2dccc3f03e1e450655d8eca5555e21b76588bb6228a45a6ee238cb23e8eeffddff618ea379dabd

    • SSDEEP

      768:JfqXZWNJ3lDOVCfeMOYlzJCZH4OK8zg5z8Ja3DFqir+boZYrzoSSGxYlRYQEOVjk:JnVKQGGaHE8AZqK+bo+rzpxOJKTpVh

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks