General

  • Target

    svchost.exe

  • Size

    54KB

  • Sample

    241113-qrxd5ssfjh

  • MD5

    161f7262ae9a6d95ce0f93e46cc5fcf9

  • SHA1

    164551a9330c19a9ed62b6e7d54c6d247704b5e0

  • SHA256

    73a74ebd5e95700aef901c8771fc4b64a677885f23e15bd67628b38e726f7408

  • SHA512

    63bcc54b5846ec20e65c660054d5f6051f357bf803451bf740d7d27505dcc3497a122d62e62ed966329d5b713b8848300bb5ddd77025a3b53cd0d53a19a4c3ea

  • SSDEEP

    1536:SgkETz/wBd3o3nnJWbdWDc06KVnO/jtg:SGnIcXJWbdWBnO/xg

Score
10/10

Malware Config

Extracted

Family

xworm

C2

45.10.151.182:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      svchost.exe

    • Size

      54KB

    • MD5

      161f7262ae9a6d95ce0f93e46cc5fcf9

    • SHA1

      164551a9330c19a9ed62b6e7d54c6d247704b5e0

    • SHA256

      73a74ebd5e95700aef901c8771fc4b64a677885f23e15bd67628b38e726f7408

    • SHA512

      63bcc54b5846ec20e65c660054d5f6051f357bf803451bf740d7d27505dcc3497a122d62e62ed966329d5b713b8848300bb5ddd77025a3b53cd0d53a19a4c3ea

    • SSDEEP

      1536:SgkETz/wBd3o3nnJWbdWDc06KVnO/jtg:SGnIcXJWbdWBnO/xg

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks