General

  • Target

    cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6.exe

  • Size

    350KB

  • Sample

    241102-kfgxes1gnj

  • MD5

    b7de42db6732cca194950ed4b2958762

  • SHA1

    e676b09f930e97a404b4dfd1a173989c39fb2681

  • SHA256

    cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6

  • SHA512

    5a51ac59b4c10838874c413bf6adfbb646475603e079499489f09a2d9d0eb2c1ae7b96dd353fed428180af82b40b51f37b6393d75addfb7aefa17bb3c9845224

  • SSDEEP

    6144:2yScVyir/fDNsNINOgKSKN6dNbSeUKmU:ZDaNC

Malware Config

Extracted

Family

xworm

C2

crazyrdp.africa:7000

Attributes
  • install_file

    USB.exe

Targets

    • Target

      cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6.exe

    • Size

      350KB

    • MD5

      b7de42db6732cca194950ed4b2958762

    • SHA1

      e676b09f930e97a404b4dfd1a173989c39fb2681

    • SHA256

      cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6

    • SHA512

      5a51ac59b4c10838874c413bf6adfbb646475603e079499489f09a2d9d0eb2c1ae7b96dd353fed428180af82b40b51f37b6393d75addfb7aefa17bb3c9845224

    • SSDEEP

      6144:2yScVyir/fDNsNINOgKSKN6dNbSeUKmU:ZDaNC

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks