General

  • Target

    1b2be35572c46c3fbdeee4056bca1cffa4bcd9c38e05fdb9d9471e48cf2dad05

  • Size

    62KB

  • Sample

    241107-j3j5maygnn

  • MD5

    3428ae8f2756b22fc4f9f7aaf60d0499

  • SHA1

    0045e6ab7d0e85840d3b2f58de7f4073b0d076b0

  • SHA256

    1b2be35572c46c3fbdeee4056bca1cffa4bcd9c38e05fdb9d9471e48cf2dad05

  • SHA512

    9359db746eadfae774c7a34df3dbd92c6a5c11162a5980423a4a8d360435dc1d0ed018520c221a4edff5de2ad3c29c31a4377eddf1e512e58776ac8b2e8fc635

  • SSDEEP

    1536:+ChVb+8/iKN4FXbHtD+SqPA6fAuVOWFpGo:+gD2XbHhWAuVOWqo

Score
10/10

Malware Config

Extracted

Family

xworm

C2

control-blair.gl.at.ply.gg:4070

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

Targets

    • Target

      1b2be35572c46c3fbdeee4056bca1cffa4bcd9c38e05fdb9d9471e48cf2dad05

    • Size

      62KB

    • MD5

      3428ae8f2756b22fc4f9f7aaf60d0499

    • SHA1

      0045e6ab7d0e85840d3b2f58de7f4073b0d076b0

    • SHA256

      1b2be35572c46c3fbdeee4056bca1cffa4bcd9c38e05fdb9d9471e48cf2dad05

    • SHA512

      9359db746eadfae774c7a34df3dbd92c6a5c11162a5980423a4a8d360435dc1d0ed018520c221a4edff5de2ad3c29c31a4377eddf1e512e58776ac8b2e8fc635

    • SSDEEP

      1536:+ChVb+8/iKN4FXbHtD+SqPA6fAuVOWFpGo:+gD2XbHhWAuVOWqo

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks