General

  • Target

    gwg.exe

  • Size

    67KB

  • Sample

    241110-khqx4stdka

  • MD5

    71dff4bce7c9df88ee150794ad9ac897

  • SHA1

    130ef6f9426c956b754d09e08fe879b9ac89e73f

  • SHA256

    91a2b73583a677271296fc0a00b2aa2088d49e5b7ab149846e03d576349abf83

  • SHA512

    739d94ccdc5b2bb758555138054633261d1d4efb07ebd5dfc0870bba4946f36d3d3fa949cffaa98391941fcad876f9f66fb67feb148667d5f0153f125aae34c0

  • SSDEEP

    1536:FTt2UoRi4p3VYOfB3IrB7HX9OuV+bOdijpEi0Ol7/ciXd:z2UohHI1ok+boiGi0OlrcW

Score
10/10

Malware Config

Extracted

Family

xworm

C2

il-putting.gl.at.ply.gg:28246

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

Targets

    • Target

      gwg.exe

    • Size

      67KB

    • MD5

      71dff4bce7c9df88ee150794ad9ac897

    • SHA1

      130ef6f9426c956b754d09e08fe879b9ac89e73f

    • SHA256

      91a2b73583a677271296fc0a00b2aa2088d49e5b7ab149846e03d576349abf83

    • SHA512

      739d94ccdc5b2bb758555138054633261d1d4efb07ebd5dfc0870bba4946f36d3d3fa949cffaa98391941fcad876f9f66fb67feb148667d5f0153f125aae34c0

    • SSDEEP

      1536:FTt2UoRi4p3VYOfB3IrB7HX9OuV+bOdijpEi0Ol7/ciXd:z2UohHI1ok+boiGi0OlrcW

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks