General

  • Target

    49fc379ad3cc304fe9e20be927dcba2450f64113a92a603e68356c75611de4d6

  • Size

    76KB

  • Sample

    241102-brc8yaxdpc

  • MD5

    3523b8fcbca84be7d9fcf61b0b3481d1

  • SHA1

    5929f22e3df6ed0db74beccf913bf6d87bfebaf6

  • SHA256

    49fc379ad3cc304fe9e20be927dcba2450f64113a92a603e68356c75611de4d6

  • SHA512

    1d603e96311a030cccb70a57ea7b71b420c6eecb576e624a3f882873e063a10baa167bbd71ae62ca2fb4b21feda789eff3a6b8df338e0763e1db023ed28277ac

  • SSDEEP

    1536:mi/Wa8ki32P8SMOR99AcYV+kucKC3afZii0UyQejY6yFOB+tkVtwsxmo:LWaXE20SMOR99ATV1KCKfZEXy6yFOBLC

Malware Config

Extracted

Family

xworm

Version

5.0

C2

172.94.18.237:8888

Mutex

9HHcJsNTVQBaXsFM

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7282855399:AAGXhAziEUJIDGOiZlvBLXUoWfRcecAxFWE/sendMessage?chat_id=5602109141

aes.plain

Targets

    • Target

      49fc379ad3cc304fe9e20be927dcba2450f64113a92a603e68356c75611de4d6

    • Size

      76KB

    • MD5

      3523b8fcbca84be7d9fcf61b0b3481d1

    • SHA1

      5929f22e3df6ed0db74beccf913bf6d87bfebaf6

    • SHA256

      49fc379ad3cc304fe9e20be927dcba2450f64113a92a603e68356c75611de4d6

    • SHA512

      1d603e96311a030cccb70a57ea7b71b420c6eecb576e624a3f882873e063a10baa167bbd71ae62ca2fb4b21feda789eff3a6b8df338e0763e1db023ed28277ac

    • SSDEEP

      1536:mi/Wa8ki32P8SMOR99AcYV+kucKC3afZii0UyQejY6yFOB+tkVtwsxmo:LWaXE20SMOR99ATV1KCKfZEXy6yFOBLC

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks