General

  • Target

    6f935745c6bffb29341d1766661ba96bfef6bdf0fa016cec6169afc33a624f47.exe

  • Size

    37KB

  • Sample

    241111-s2xh1a1clp

  • MD5

    ed094471653276ce7f933ff63508c4b6

  • SHA1

    5fe4c184e7915d7d79ada1f123de7263f7e3f41a

  • SHA256

    6f935745c6bffb29341d1766661ba96bfef6bdf0fa016cec6169afc33a624f47

  • SHA512

    0b1a108dea4f7540b5a52d4080f34d7acf6e91d90412acbc75e02510771b8e28d65f912756263bd33f986cb28a0e935616b14f1913d93e68c71f9f82c69d7fee

  • SSDEEP

    768:ztGRiYTgP/NNo5GfjS61216La/FP192iOphi7X4:zkRi+gsGu6McLgFt92iOpeX4

Malware Config

Extracted

Family

xworm

Version

3.1

C2

role-fresh.gl.at.ply.gg:2522

Mutex

tZ4Yyzni0aPUlFjz

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      6f935745c6bffb29341d1766661ba96bfef6bdf0fa016cec6169afc33a624f47.exe

    • Size

      37KB

    • MD5

      ed094471653276ce7f933ff63508c4b6

    • SHA1

      5fe4c184e7915d7d79ada1f123de7263f7e3f41a

    • SHA256

      6f935745c6bffb29341d1766661ba96bfef6bdf0fa016cec6169afc33a624f47

    • SHA512

      0b1a108dea4f7540b5a52d4080f34d7acf6e91d90412acbc75e02510771b8e28d65f912756263bd33f986cb28a0e935616b14f1913d93e68c71f9f82c69d7fee

    • SSDEEP

      768:ztGRiYTgP/NNo5GfjS61216La/FP192iOphi7X4:zkRi+gsGu6McLgFt92iOpeX4

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks