General

  • Target

    8b5adc6f3c676a3970354950e3f97f71c6e1ee01e7de4168ae4f76a67127e010N

  • Size

    35KB

  • Sample

    241109-q2542avhrk

  • MD5

    de061f493e4e8c9b00240b5cae741850

  • SHA1

    621c1f7c3065ab3bac0f8669a739625a09e40b72

  • SHA256

    8b5adc6f3c676a3970354950e3f97f71c6e1ee01e7de4168ae4f76a67127e010

  • SHA512

    a88de8bbc05cc65bd0467403e1f5f30a5565b8f21f4b4df23fb3e0b48bcabb96ab8dcf35df972b2df0272ab16d210b3912c9ae349eb89e1dc03e7af3cb7d9f0f

  • SSDEEP

    768:1TjJie2KzgW6+p4BOPWas5066TFyI9CWOjhnbXW1:1TF24iBdGFD9CWOj1W1

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

108.228.0.61:7000

Mutex

YAb6ejIPkr2jgvWV

Attributes
  • install_file

    spoof.exe

aes.plain

Targets

    • Target

      8b5adc6f3c676a3970354950e3f97f71c6e1ee01e7de4168ae4f76a67127e010N

    • Size

      35KB

    • MD5

      de061f493e4e8c9b00240b5cae741850

    • SHA1

      621c1f7c3065ab3bac0f8669a739625a09e40b72

    • SHA256

      8b5adc6f3c676a3970354950e3f97f71c6e1ee01e7de4168ae4f76a67127e010

    • SHA512

      a88de8bbc05cc65bd0467403e1f5f30a5565b8f21f4b4df23fb3e0b48bcabb96ab8dcf35df972b2df0272ab16d210b3912c9ae349eb89e1dc03e7af3cb7d9f0f

    • SSDEEP

      768:1TjJie2KzgW6+p4BOPWas5066TFyI9CWOjhnbXW1:1TF24iBdGFD9CWOj1W1

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks