General

  • Target

    j.exe

  • Size

    66KB

  • Sample

    241110-ybbfqswqgk

  • MD5

    9c80f155a33d34f6deede20b10c9c3da

  • SHA1

    a6b3c0fa6c2888735c4b7f841a04e8628dd293ae

  • SHA256

    7e8200654fe03cab3bd6dc9ebb4a603fcf0e1203de7c4496fa03af4591778e09

  • SHA512

    93c262894e159db8c956f4a22f5837f9f377af81161de2ac753d9899427c5ce4d79008fc996e2c76c6c660a7626d2b9bd38bb04022e2b6013bc2231de1312f0f

  • SSDEEP

    1536:K/Wt9q5XZ2kHIc06PDJUORlKGbxRUoL+WI8G6xtO317uLo:Dw5zLcqKGbxR1+WI87O31Qo

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:15863

Attributes
  • Install_directory

    %AppData%

  • install_file

    client.exe

Targets

    • Target

      j.exe

    • Size

      66KB

    • MD5

      9c80f155a33d34f6deede20b10c9c3da

    • SHA1

      a6b3c0fa6c2888735c4b7f841a04e8628dd293ae

    • SHA256

      7e8200654fe03cab3bd6dc9ebb4a603fcf0e1203de7c4496fa03af4591778e09

    • SHA512

      93c262894e159db8c956f4a22f5837f9f377af81161de2ac753d9899427c5ce4d79008fc996e2c76c6c660a7626d2b9bd38bb04022e2b6013bc2231de1312f0f

    • SSDEEP

      1536:K/Wt9q5XZ2kHIc06PDJUORlKGbxRUoL+WI8G6xtO317uLo:Dw5zLcqKGbxR1+WI87O31Qo

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks