General

  • Target

    eheheh.exe

  • Size

    83KB

  • Sample

    241110-ja4nkasdnn

  • MD5

    6bb17f4042738219708a1fcd785b2f20

  • SHA1

    7b7f33f12a9a7602ad2b1128ca51b4336c63bf8b

  • SHA256

    52f750c805eb0d8d1175b9b648bc6e458bcbb33048c864d8e064099c44addfa1

  • SHA512

    f4c22bc88e3644621fcc2853562e8312a4b68c673148742b0cae3c54c0e7c80f19c31d9d32114a385fabb1248740467b19bea1ab0d6d05c42ca35878e4c8e8e6

  • SSDEEP

    1536:POGdaV0R6Gkp3UyLshEjoE9I8uEMWb15uaGM53/m8AWm6Z3JOY451:WGdBS3Un8oE9I8+Wb15uaxxL3JOY43

Score
10/10

Malware Config

Extracted

Family

xworm

C2

about-publishing.gl.at.ply.gg:49157

Attributes
  • Install_directory

    %AppData%

  • install_file

    update.exe

Targets

    • Target

      eheheh.exe

    • Size

      83KB

    • MD5

      6bb17f4042738219708a1fcd785b2f20

    • SHA1

      7b7f33f12a9a7602ad2b1128ca51b4336c63bf8b

    • SHA256

      52f750c805eb0d8d1175b9b648bc6e458bcbb33048c864d8e064099c44addfa1

    • SHA512

      f4c22bc88e3644621fcc2853562e8312a4b68c673148742b0cae3c54c0e7c80f19c31d9d32114a385fabb1248740467b19bea1ab0d6d05c42ca35878e4c8e8e6

    • SSDEEP

      1536:POGdaV0R6Gkp3UyLshEjoE9I8uEMWb15uaGM53/m8AWm6Z3JOY451:WGdBS3Un8oE9I8+Wb15uaxxL3JOY43

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks