General

  • Target

    LadBeams.exe

  • Size

    36KB

  • Sample

    241110-xw6xpssnet

  • MD5

    10e43f7859cef3d334e51f2043c7521d

  • SHA1

    0a4d61955bcd2a849d94f3421a1b4c8643a63378

  • SHA256

    3a07029a28172b8ee690bbf943ac0f45f819611b90bd2dda444aa972d145cf38

  • SHA512

    22bcdcd592035b12b81c76b896372c05b4ffcb983cac2777510b924a49ed98b74409d6ea83829f3bfe1898dd99532db677b9bdc403a64fbd6eaed7692c3720a3

  • SSDEEP

    768:kra5QDoJFA4g+xCwdW9OFpVFr9oxOwhmu/ZaR:+a5QDeRg+8wgSXFr9oxOw0hR

Malware Config

Extracted

Family

xworm

Version

3.1

Mutex

TXNXspXqHQ7kFGni

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      LadBeams.exe

    • Size

      36KB

    • MD5

      10e43f7859cef3d334e51f2043c7521d

    • SHA1

      0a4d61955bcd2a849d94f3421a1b4c8643a63378

    • SHA256

      3a07029a28172b8ee690bbf943ac0f45f819611b90bd2dda444aa972d145cf38

    • SHA512

      22bcdcd592035b12b81c76b896372c05b4ffcb983cac2777510b924a49ed98b74409d6ea83829f3bfe1898dd99532db677b9bdc403a64fbd6eaed7692c3720a3

    • SSDEEP

      768:kra5QDoJFA4g+xCwdW9OFpVFr9oxOwhmu/ZaR:+a5QDeRg+8wgSXFr9oxOw0hR

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks