General

  • Target

    test1.exe

  • Size

    64KB

  • Sample

    241109-ltm62asdmd

  • MD5

    9102a37f6aea129203c69401b3fe9720

  • SHA1

    b622081cc2baec9764b2156e99fe1afeaf0cb73f

  • SHA256

    ab77001bb0302e94eb707a07858b174ef90f40e67826d97e725e35f835d5787b

  • SHA512

    fc451d29220cb0d9a66cd24c1f9ce6ff2a54b133275a6b43d93e37708c5a70d84ae2d6e9928f8810ef63d43196de99ff1949b4984ba290e4eae3cc41f5c40c40

  • SSDEEP

    1536:T30ovakP/3QLHp6PcXbZe/XiBwZSNpV8OwURvCl:jh3+rbYqfV8OwUBM

Malware Config

Extracted

Family

xworm

C2

0.tcp.ap.ngrok.io:4411

Attributes
  • Install_directory

    %Public%

  • install_file

    hh.exe

Targets

    • Target

      test1.exe

    • Size

      64KB

    • MD5

      9102a37f6aea129203c69401b3fe9720

    • SHA1

      b622081cc2baec9764b2156e99fe1afeaf0cb73f

    • SHA256

      ab77001bb0302e94eb707a07858b174ef90f40e67826d97e725e35f835d5787b

    • SHA512

      fc451d29220cb0d9a66cd24c1f9ce6ff2a54b133275a6b43d93e37708c5a70d84ae2d6e9928f8810ef63d43196de99ff1949b4984ba290e4eae3cc41f5c40c40

    • SSDEEP

      1536:T30ovakP/3QLHp6PcXbZe/XiBwZSNpV8OwURvCl:jh3+rbYqfV8OwUBM

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks