General

  • Target

    Impulse Spoof.exe

  • Size

    33KB

  • Sample

    241117-k7j6vswhpl

  • MD5

    c295fde2ff84c9adbf62426ffa094265

  • SHA1

    e37a13c0d53726526df331d9c5013514bbe6f18b

  • SHA256

    d96ba77a6038e8ee3d5a03fd69affbdfe0b36ab074b92320d263da75b1b2d32a

  • SHA512

    5332daac116fc882ab6427681c2418abcfe507df6e0d1e73cf97748b3ad1a1fb46097cfaae552fcf7d5b7fbb4f87ea4c6f4e7b221b6bd83850b6f7504cad063f

  • SSDEEP

    384:Sl8UlK/V9FoBZ9aZV0NLx7o92lKZaJZvf/95ApkFy7BLT/OZwpGmTv99Ikciszjo:aO/VMOGxwgJZvn9dFyJ9FCj4LOjhwJV

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

sep-framing.gl.at.ply.gg:61526

Mutex

Q67Vx5bQ2jgfNOaG

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Impulse Spoof.exe

    • Size

      33KB

    • MD5

      c295fde2ff84c9adbf62426ffa094265

    • SHA1

      e37a13c0d53726526df331d9c5013514bbe6f18b

    • SHA256

      d96ba77a6038e8ee3d5a03fd69affbdfe0b36ab074b92320d263da75b1b2d32a

    • SHA512

      5332daac116fc882ab6427681c2418abcfe507df6e0d1e73cf97748b3ad1a1fb46097cfaae552fcf7d5b7fbb4f87ea4c6f4e7b221b6bd83850b6f7504cad063f

    • SSDEEP

      384:Sl8UlK/V9FoBZ9aZV0NLx7o92lKZaJZvf/95ApkFy7BLT/OZwpGmTv99Ikciszjo:aO/VMOGxwgJZvn9dFyJ9FCj4LOjhwJV

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Deletes itself

MITRE ATT&CK Matrix

Tasks