General

  • Target

    xworm v5.6.exe

  • Size

    112KB

  • Sample

    241103-w385za1fnj

  • MD5

    26dc5b4b6ebc5278f0b06537d59a415b

  • SHA1

    a9df7ccf50768979c6f2828265ad1992fd6526fa

  • SHA256

    de78531cc0db12e7733944aaa39131e3201336799b57645c07c8b07c594539d3

  • SHA512

    729bb095fdc9beb4de217cc80bc7ecfd29e8b799bf170242ceaaa9ff369868fe5160865511fe85a8fda42b4432b6afcf0b7487ace2cd1735f1ab7275caa53b6a

  • SSDEEP

    3072:qIBWqjPVbq0h3Xi/O0U+FY7fgAdoheNS:qaHjPVbq0VO5vEN

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:43897

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    xworm v5.6.exe

Targets

    • Target

      xworm v5.6.exe

    • Size

      112KB

    • MD5

      26dc5b4b6ebc5278f0b06537d59a415b

    • SHA1

      a9df7ccf50768979c6f2828265ad1992fd6526fa

    • SHA256

      de78531cc0db12e7733944aaa39131e3201336799b57645c07c8b07c594539d3

    • SHA512

      729bb095fdc9beb4de217cc80bc7ecfd29e8b799bf170242ceaaa9ff369868fe5160865511fe85a8fda42b4432b6afcf0b7487ace2cd1735f1ab7275caa53b6a

    • SSDEEP

      3072:qIBWqjPVbq0h3Xi/O0U+FY7fgAdoheNS:qaHjPVbq0VO5vEN

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks