General

  • Target

    FrameHost.exe

  • Size

    120KB

  • Sample

    241104-zb71dawhmc

  • MD5

    2e7bdd19ac4b1b5392d1d3ae047c9379

  • SHA1

    67b4265da671de12bd3830f3e45f02e020ce85f4

  • SHA256

    a51949df9057c52262a8e2a93bb34a76ec1a35374ba9ab6d2928f98f99af8f7f

  • SHA512

    d83458902b1e430ae887a7a3b2b4cc328e965c61f30e40228bf8aba437c6185c16aef8eef031d8b69c7c436e226fad18b6792cc73f3642cd74f87cfddfc27646

  • SSDEEP

    3072:n5NmCd8utYMmTCZbwW8clWOCo1a94Yjv:neCDYnWbWOCR6Yjv

Malware Config

Extracted

Family

xworm

C2

93.123.109.89:7000

Attributes
  • Install_directory

    %Temp%

  • install_file

    ApplicationFrameHost.exe

  • telegram

    https://api.telegram.org/bot7026989332:AAGmlQvBZEqqtR_5LGfdSJ8B_oJ6WH5oCYY

Targets

    • Target

      FrameHost.exe

    • Size

      120KB

    • MD5

      2e7bdd19ac4b1b5392d1d3ae047c9379

    • SHA1

      67b4265da671de12bd3830f3e45f02e020ce85f4

    • SHA256

      a51949df9057c52262a8e2a93bb34a76ec1a35374ba9ab6d2928f98f99af8f7f

    • SHA512

      d83458902b1e430ae887a7a3b2b4cc328e965c61f30e40228bf8aba437c6185c16aef8eef031d8b69c7c436e226fad18b6792cc73f3642cd74f87cfddfc27646

    • SSDEEP

      3072:n5NmCd8utYMmTCZbwW8clWOCo1a94Yjv:neCDYnWbWOCR6Yjv

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Uses the VBS compiler for execution

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks