General

  • Target

    800a0420d1c08193913755e474bea018ced509606c451729a227859f4c3d2e70N

  • Size

    42KB

  • Sample

    241112-ertsgavdng

  • MD5

    5e111d9781b22617a23b4e14480b5ea0

  • SHA1

    8ab08a45d313c0f21b68b6c1d0f36e51876935b7

  • SHA256

    800a0420d1c08193913755e474bea018ced509606c451729a227859f4c3d2e70

  • SHA512

    389d98e2547a209f5225b19ecb4e5183cc540bacb35428873575bb8ced60f5125afb804eaaa6efdd413bd3ad71cb8fae5419403fadbaba9b0200134b7b7adfb8

  • SSDEEP

    768:/qTF41hqoKgCsDTO2QhFmp6F5PX9OaP68OMhI3/C2Z:/sOhqxbAa28FBF19jP68OM+66

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7772

13.71.91.225:7772

Mutex

O2HrqiBNIPRwtLPC

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • telegram

    https://api.telegram.org/bot7585343577:AAHgS-QNhULHIXmK3EKIXWuMP2uRNZpJjd8/sendMessage?chat_id=5424396760

aes.plain

Targets

    • Target

      800a0420d1c08193913755e474bea018ced509606c451729a227859f4c3d2e70N

    • Size

      42KB

    • MD5

      5e111d9781b22617a23b4e14480b5ea0

    • SHA1

      8ab08a45d313c0f21b68b6c1d0f36e51876935b7

    • SHA256

      800a0420d1c08193913755e474bea018ced509606c451729a227859f4c3d2e70

    • SHA512

      389d98e2547a209f5225b19ecb4e5183cc540bacb35428873575bb8ced60f5125afb804eaaa6efdd413bd3ad71cb8fae5419403fadbaba9b0200134b7b7adfb8

    • SSDEEP

      768:/qTF41hqoKgCsDTO2QhFmp6F5PX9OaP68OMhI3/C2Z:/sOhqxbAa28FBF19jP68OM+66

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks