General

  • Target

    ae6f59d14ce7584e9dccf8e88f540fac601d92d35c6e6b0013f4e6682d08e7e5

  • Size

    384KB

  • Sample

    241107-aeklta1dja

  • MD5

    5b24d055de2315fc815bdc4f771ecb26

  • SHA1

    36f0b41d65b32827412ec4dd31e60081406ed4ac

  • SHA256

    ae6f59d14ce7584e9dccf8e88f540fac601d92d35c6e6b0013f4e6682d08e7e5

  • SHA512

    9c291b18df19dac2f0ff7cdcaaf6d6fd58e9e592d9690eef9ff257ccc7432f6f56f634641dc6ac9e3857e22ae26ea0f487c1d8090f53746a64d06a4e3c0492d2

  • SSDEEP

    12288:2k6wOOlsur4fw+97KIyR2hCeS+FlPDkjWKUus:D6wD+RXhKIyR2EeTlPojlUP

Malware Config

Extracted

Family

xworm

Version

5.0

C2

weidmachane.zapto.org:7000

Mutex

Y3sPpIW4xQztdVfl

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

latentbot

C2

weidmachane.zapto.org

Targets

    • Target

      ORDER DRAWING AND PHOTOS.exe

    • Size

      2.0MB

    • MD5

      395bb950d2979e4c3911d90852c06345

    • SHA1

      2a693150907af200bbf8582a69e663d23249c7d0

    • SHA256

      1adbc19898a40ae7f2c6fd9a6d1c502c7152ba6b04d4584e2c7476606f9b24ff

    • SHA512

      d95b46177b0820f286e99f647ff398788d24502885fc2b63fe19dfb1a58d7ae15cabd2749ab00b709b37a3fb75b9ccf28628ad2f686a507fc1142486a8f32b61

    • SSDEEP

      12288:xkNH+OOlsur4fwML7K6yD210eS+Fl1DkjGKUuU6Sn:mH+D+Hb3K6yD22eTl1oj1UYq

    • Detect Xworm Payload

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks