General

  • Target

    244db0aad5271d5d5ce245acb02c0856673f7dcefcccd65007b7fc604dcda570.zip

  • Size

    378KB

  • Sample

    241116-cpn34axjcy

  • MD5

    c10b8c06b032dbf489a6f63522504201

  • SHA1

    7920febefd80151a4193684d398f3e60865eca63

  • SHA256

    244db0aad5271d5d5ce245acb02c0856673f7dcefcccd65007b7fc604dcda570

  • SHA512

    867899262a6490450c41ae665212e031e5b8f93f37968fae0dde86792a2726989a0ea921b7914967770de772a9a9912cb94ece48127748658da577cb171ea7ee

  • SSDEEP

    6144:Iz9C4mSg6p4lp2C+zcDNJyvhu12ysAk9ZwlWDVRuIqnbeWrBY3OdNTJm4JrXMCI5:E9xmFOcDnyvhuxsAkBDVArnbeMBYedX6

Malware Config

Extracted

Family

xworm

Version

3.1

C2

savelat19847.duckdns.org:7000

Mutex

6FO7gyeQQmt4IGRZ

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Item Specifications.exe

    • Size

      1.3MB

    • MD5

      5e8c689ae7f342a2b2dcf76ad9f990d4

    • SHA1

      dc659d8c8284c0ec2d5cd4b0c4dd3a250d481331

    • SHA256

      b2e9b488e12360fc455512ddae99dba10dd455df423853875e89ac1ffbdd06be

    • SHA512

      46bd683b51c45cc92d5b35c236d8e339ab808cd87465eebd7f1a96ccdb28f994e0048a185a46a68dfd106e6fdd6e46a75c85caea180c03ac20ca2e3e778e64c9

    • SSDEEP

      12288:0kjmrocDPyNhuTsAGBDNMrRbeyBYidXG4LrXFb2N:0ZbPyNqsAwyFCreDJKN

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks