General

  • Target

    VmxCheats.exe

  • Size

    39KB

  • Sample

    241117-rd5c9s1jhx

  • MD5

    640194b0d51307f362b74fd4a4a1761d

  • SHA1

    8e623f6ba2c87803f079b85578289359d71c6c90

  • SHA256

    b31d01d8e826ea4773cd7cfdbfca3712287024c03463acb374b5040af27fae71

  • SHA512

    7631827a014041c8066e334584116db7a3320de4fbbae285c9c87bccc53381ddc525add1f031e5920e01450155aa22b1550de2725ff213ea9fbb3e5c26118dc2

  • SSDEEP

    768:feMIxy4cStkT1MfdDtVISFp9ITOMhkbF:feMIxnmpM5X3Fp9ITOMiJ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

perfect-invest.gl.at.ply.gg:61586

Mutex

vnCrrKpdlb0ooKNR

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot7602273147:AAGPHHPgO8DxUDOWK0ZCgtSD_Rua_8wVzrE/sendMessage?chat_id=6589427579

aes.plain

Targets

    • Target

      VmxCheats.exe

    • Size

      39KB

    • MD5

      640194b0d51307f362b74fd4a4a1761d

    • SHA1

      8e623f6ba2c87803f079b85578289359d71c6c90

    • SHA256

      b31d01d8e826ea4773cd7cfdbfca3712287024c03463acb374b5040af27fae71

    • SHA512

      7631827a014041c8066e334584116db7a3320de4fbbae285c9c87bccc53381ddc525add1f031e5920e01450155aa22b1550de2725ff213ea9fbb3e5c26118dc2

    • SSDEEP

      768:feMIxy4cStkT1MfdDtVISFp9ITOMhkbF:feMIxnmpM5X3Fp9ITOMiJ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks