General

  • Target

    66d19a418b63a7d1fe5aedb22b4632f65588cd8b4bff4873c0a1938585009e3eN

  • Size

    552KB

  • Sample

    241105-a4664stkcp

  • MD5

    10bbf67948e6dddb51f6f08d018c0af0

  • SHA1

    241eca0187de98f65f76253e1ea8998f5d51fbe5

  • SHA256

    66d19a418b63a7d1fe5aedb22b4632f65588cd8b4bff4873c0a1938585009e3e

  • SHA512

    f6b2b3b2e0ca98ce80a55962c6778a94d7d2d6b7f25999965fc0a466f8d095fe729fbdc346049c9d90d76212e05314d16dcd3f28066cc51b93c9ca4883cfdfd2

  • SSDEEP

    6144:I5vWMUYDhcGHAsDkeA5IvxDmUAI+K366Ujge5DAtAvKhAp081nNVjqKoeS:IxWCDhVXA5IvQ0mjgAPy6nnjqKoeS

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

4SlUuKAVMJTCYjjd

Attributes
  • Install_directory

    %AppData%

  • install_file

    pdf.exe

aes.plain

Targets

    • Target

      66d19a418b63a7d1fe5aedb22b4632f65588cd8b4bff4873c0a1938585009e3eN

    • Size

      552KB

    • MD5

      10bbf67948e6dddb51f6f08d018c0af0

    • SHA1

      241eca0187de98f65f76253e1ea8998f5d51fbe5

    • SHA256

      66d19a418b63a7d1fe5aedb22b4632f65588cd8b4bff4873c0a1938585009e3e

    • SHA512

      f6b2b3b2e0ca98ce80a55962c6778a94d7d2d6b7f25999965fc0a466f8d095fe729fbdc346049c9d90d76212e05314d16dcd3f28066cc51b93c9ca4883cfdfd2

    • SSDEEP

      6144:I5vWMUYDhcGHAsDkeA5IvxDmUAI+K366Ujge5DAtAvKhAp081nNVjqKoeS:IxWCDhVXA5IvQ0mjgAPy6nnjqKoeS

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks