General

  • Target

    be69709414e60eae521dc4b85784bceda124959adc21b554aaa660707dbbe89c.exe

  • Size

    2.4MB

  • Sample

    241109-d3grlswhjb

  • MD5

    bdc6432b365c256c5d0efe8d66122e8f

  • SHA1

    1ca7dda606a3b2204f35e43abb68b04c97063d36

  • SHA256

    be69709414e60eae521dc4b85784bceda124959adc21b554aaa660707dbbe89c

  • SHA512

    3d28acbe162b0d88f1b3ca8a034c010a973ccc05ff3f0f0a9dbb902f98924cae1bce5f1b9f20f58567669503c41e9696000fb27edda4416398f0e7aac525b767

  • SSDEEP

    49152:+2uqU+xRoatgQBJKweR4RF8gAGBJ7dj9Shv68pd3hm/F4OGP6:+2uOxRoaOQBEws4gWrhcoq3HOz

Score
10/10

Malware Config

Extracted

Family

xworm

C2

93.123.109.89:7000

Attributes
  • Install_directory

    %Temp%

  • install_file

    ApplicationFrameHost.exe

  • telegram

    https://api.telegram.org/bot7026989332:AAGmlQvBZEqqtR_5LGfdSJ8B_oJ6WH5oCYY

Targets

    • Target

      be69709414e60eae521dc4b85784bceda124959adc21b554aaa660707dbbe89c.exe

    • Size

      2.4MB

    • MD5

      bdc6432b365c256c5d0efe8d66122e8f

    • SHA1

      1ca7dda606a3b2204f35e43abb68b04c97063d36

    • SHA256

      be69709414e60eae521dc4b85784bceda124959adc21b554aaa660707dbbe89c

    • SHA512

      3d28acbe162b0d88f1b3ca8a034c010a973ccc05ff3f0f0a9dbb902f98924cae1bce5f1b9f20f58567669503c41e9696000fb27edda4416398f0e7aac525b767

    • SSDEEP

      49152:+2uqU+xRoatgQBJKweR4RF8gAGBJ7dj9Shv68pd3hm/F4OGP6:+2uOxRoaOQBEws4gWrhcoq3HOz

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks