General

  • Target

    freerobuxcr.exe

  • Size

    300KB

  • Sample

    241109-j4ss6a1dle

  • MD5

    b058cfccc6773c1bb61bf6b357beac93

  • SHA1

    f5ac8e27bccac0ac28dd3fd4585e12f9801dc9fa

  • SHA256

    5a2d8236f0b085c15740c484cdcc4905cd72dd75e0b9af8d3c1566b6051bdf3f

  • SHA512

    ea677ebd803082435228fe4d1f43d84ee4f6f81782c159a93aa318adacaf8d2b3848385ab8826cd405eb93df7dd8713facc927c4d3d333e4073acf66be5c5de5

  • SSDEEP

    3072:jhWu6gKlGmaC4CN8KI7inGK1uUg9SaJSgQ6pCtiFCzH:

Score
10/10

Malware Config

Extracted

Family

xworm

C2

23.ip.gl.ply.gg:7000

Attributes
  • Install_directory

    %Public%

  • install_file

    svchost.exe

Targets

    • Target

      freerobuxcr.exe

    • Size

      300KB

    • MD5

      b058cfccc6773c1bb61bf6b357beac93

    • SHA1

      f5ac8e27bccac0ac28dd3fd4585e12f9801dc9fa

    • SHA256

      5a2d8236f0b085c15740c484cdcc4905cd72dd75e0b9af8d3c1566b6051bdf3f

    • SHA512

      ea677ebd803082435228fe4d1f43d84ee4f6f81782c159a93aa318adacaf8d2b3848385ab8826cd405eb93df7dd8713facc927c4d3d333e4073acf66be5c5de5

    • SSDEEP

      3072:jhWu6gKlGmaC4CN8KI7inGK1uUg9SaJSgQ6pCtiFCzH:

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks