General

  • Target

    82549e9e27a539e6bfd29c015682f93c7aac81f35035146dd64312783e7a8008N.exe

  • Size

    56KB

  • Sample

    241117-1s85fayhld

  • MD5

    fae36591a84f55e92cb352a4324cb180

  • SHA1

    64206e9b6e16e2e55db3e66f19024d31d87a0ad9

  • SHA256

    82549e9e27a539e6bfd29c015682f93c7aac81f35035146dd64312783e7a8008

  • SHA512

    520da9816801b36e5cefce3e64fd2ee8f34483a5298d60584224b3371f0b473d5402c19889067d2188aaf3db4b4382936b96509ab0eb34c7669676cae2c12f4f

  • SSDEEP

    1536:ASFTU9xZVqGdtCfBXdi99iQTkbb4IJlqRp2OHLQ:ASFTUNVq04fBti91Tkbb8Rp2OHLQ

Malware Config

Extracted

Family

xworm

C2

Cactus-33152.portmap.host:33152

Attributes
  • Install_directory

    %AppData%

  • install_file

    Teams.exe

Targets

    • Target

      82549e9e27a539e6bfd29c015682f93c7aac81f35035146dd64312783e7a8008N.exe

    • Size

      56KB

    • MD5

      fae36591a84f55e92cb352a4324cb180

    • SHA1

      64206e9b6e16e2e55db3e66f19024d31d87a0ad9

    • SHA256

      82549e9e27a539e6bfd29c015682f93c7aac81f35035146dd64312783e7a8008

    • SHA512

      520da9816801b36e5cefce3e64fd2ee8f34483a5298d60584224b3371f0b473d5402c19889067d2188aaf3db4b4382936b96509ab0eb34c7669676cae2c12f4f

    • SSDEEP

      1536:ASFTU9xZVqGdtCfBXdi99iQTkbb4IJlqRp2OHLQ:ASFTUNVq04fBti91Tkbb8Rp2OHLQ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks