General

  • Target

    file.exe

  • Size

    1.4MB

  • Sample

    241105-qxyjds1ndx

  • MD5

    7d7e24137d26338d8729761d740b0c04

  • SHA1

    a50cf1255b04fec0a34ab695993bff21a4a05ddf

  • SHA256

    f215e0525ac3365a7d33a949db3a7efa90811992e665e243f385fc00dc653c16

  • SHA512

    72c84b53d4a5f488fab1b43ab3e5f4cbd3414d44946d94b3bccff3d29f3083ddcf3ae900efebf2b01585e4836ed0d0085aa1a8dc8650fee18168f3c2bff4b591

  • SSDEEP

    24576:vjfZlBBYhEotw3Byz8uTZN8ekilz8CiglbMhupYq3MtXtU4YIuPc8HW6Lp:v7ZTauotw3Bg5TjR8sWuP8t9U2icAW

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:8895

162.230.48.189:8895

Mutex

ZRGtN7NDh24Vx89x

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      file.exe

    • Size

      1.4MB

    • MD5

      7d7e24137d26338d8729761d740b0c04

    • SHA1

      a50cf1255b04fec0a34ab695993bff21a4a05ddf

    • SHA256

      f215e0525ac3365a7d33a949db3a7efa90811992e665e243f385fc00dc653c16

    • SHA512

      72c84b53d4a5f488fab1b43ab3e5f4cbd3414d44946d94b3bccff3d29f3083ddcf3ae900efebf2b01585e4836ed0d0085aa1a8dc8650fee18168f3c2bff4b591

    • SSDEEP

      24576:vjfZlBBYhEotw3Byz8uTZN8ekilz8CiglbMhupYq3MtXtU4YIuPc8HW6Lp:v7ZTauotw3Bg5TjR8sWuP8t9U2icAW

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks