General

  • Target

    ZeroxStealerInstaller.exe.zip

  • Size

    2.9MB

  • Sample

    241108-zlkb3azarf

  • MD5

    c66179f4ac121543b97d02c0b57e7f59

  • SHA1

    008e3d9ddbee7544a0e063bab08f036599f401bc

  • SHA256

    1eb0ce0f9552d19ba26fc379582149b662c5706afa3f2de64aafa29c65489dc1

  • SHA512

    960f01b31f3b1390c6e04dd37d9f94a07094de2236d611430fd3cdd3d0f9755e51a988dbfb0e8147f6a01e8194333c77c5c31ffc44715013b137ab99d5731603

  • SSDEEP

    49152:3ny6qohNmsgwM47DvryGnf6T0Zs0YZRpb6YA5xVEarmKIL+Wa88jOB+7NBMg4QNU:3y6qwNmsgwvDjs0YZ7yfTILvojxXU

Score
10/10

Malware Config

Extracted

Family

xworm

C2

lijaligibidu-35558.portmap.host:35558

127.0.0.1:28019

chilhoek-28019.portmap.host:28019

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Security.exe

Targets

    • Target

      ZeroxStealerInstaller.exe

    • Size

      2.9MB

    • MD5

      9b1a7d9403b93f7a390d953c2785a9ed

    • SHA1

      0246222a9290cd73bfda0e402722a82d04507a43

    • SHA256

      97b156f53366d0aac2e46c97b8f7bb3efb1a541e0a923aed24c0f8e7d4c4ee25

    • SHA512

      fdf61c48deee07db3563859a934fd9238c3ed33bd68b180fbf46d121b233359b69d3ec6c370f0ca17bbdb444ec8a784985d54a06704dfe1ea22701124b0fc4b0

    • SSDEEP

      49152:qvo+8aGzQqDRtQH/vpxWIfKgVgVKkbmNoi7r+ogPpkZs/ohvc8q8IzIWvuA8KXAb:qh83dRtMvb/KgVLNNwRkVhBNIzWvKo

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks