General

  • Target

    0852070946c994c917dc120520af8bb0c482c583ee46c7f97af0d7d0b5cb879fN.exe

  • Size

    142KB

  • Sample

    241111-j7gv3awhkf

  • MD5

    264c15ac721a2f333c487e4f10cf5dd6

  • SHA1

    b7b452dd8e88dc47572061b563f33c05b6d8acbc

  • SHA256

    72236b0c3065f7c3d5fdb92c12360ba861da775d04575a0dd2e24c49cfc72903

  • SHA512

    0c3f91e80a019ecd55d9dbf820fd38d61b640a8e4f0d5ee0e5b2a076f788c8ca4aa1194a5c444d9cb22d528355911263815708cceceeb0e3872fa0fdb7799f4b

  • SSDEEP

    768:EG2ZOWZ42nxujIXvgggCLJF5PG9pm9X6vOwh03Emzk621sIwEk4w00wIF:EG2bZ42n0UXvvgcFI9Ah6vOwO9HEUF

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

rather-obtain.gl.at.ply.gg:41839

Mutex

H1dYqdAbVrDWBJtu

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      0852070946c994c917dc120520af8bb0c482c583ee46c7f97af0d7d0b5cb879fN.exe

    • Size

      142KB

    • MD5

      264c15ac721a2f333c487e4f10cf5dd6

    • SHA1

      b7b452dd8e88dc47572061b563f33c05b6d8acbc

    • SHA256

      72236b0c3065f7c3d5fdb92c12360ba861da775d04575a0dd2e24c49cfc72903

    • SHA512

      0c3f91e80a019ecd55d9dbf820fd38d61b640a8e4f0d5ee0e5b2a076f788c8ca4aa1194a5c444d9cb22d528355911263815708cceceeb0e3872fa0fdb7799f4b

    • SSDEEP

      768:EG2ZOWZ42nxujIXvgggCLJF5PG9pm9X6vOwh03Emzk621sIwEk4w00wIF:EG2bZ42n0UXvvgcFI9Ah6vOwO9HEUF

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks