General

  • Target

    b7de42db6732cca194950ed4b2958762.bin

  • Size

    172KB

  • Sample

    241103-b23lks1dnf

  • MD5

    75803f586257f38796c47729f75fbd58

  • SHA1

    e5e8189ac812417392c1ea27322a5e38b7bc3bcd

  • SHA256

    ddd313c998b0b2e2b3b996adfcf787455d2f28d8588c9695c9e4e926187dafbd

  • SHA512

    355269082cae76be2363ef89f95fa65b112e1072fc9da96135da53ceb13ca28f05086f89b08c20071ff3580f2e6197e9fd909a35a32aa24390b84abaf418fde7

  • SSDEEP

    3072:Ks6vSSu2P+yo4g/Xd8BfHlowbxanrfU/4DvsMPfoWL9JLtiWaRSTnsv/:KJvXjguHlowbxarCevscoK0Z13

Malware Config

Extracted

Family

xworm

C2

crazyrdp.africa:7000

Attributes
  • install_file

    USB.exe

Targets

    • Target

      cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6.exe

    • Size

      350KB

    • MD5

      b7de42db6732cca194950ed4b2958762

    • SHA1

      e676b09f930e97a404b4dfd1a173989c39fb2681

    • SHA256

      cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6

    • SHA512

      5a51ac59b4c10838874c413bf6adfbb646475603e079499489f09a2d9d0eb2c1ae7b96dd353fed428180af82b40b51f37b6393d75addfb7aefa17bb3c9845224

    • SSDEEP

      6144:2yScVyir/fDNsNINOgKSKN6dNbSeUKmU:ZDaNC

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks