General

  • Target

    Async Spoofer.exe

  • Size

    57KB

  • Sample

    241117-yafn3axaqc

  • MD5

    61ad698be29af6af78a4d72cbecc612f

  • SHA1

    b58f0d473b9aa56b1b0e95322e2cbd4d9c273d12

  • SHA256

    12a60961e377b05f0dcd728e1e5f469754c3003c31024db47a83c940bf22b474

  • SHA512

    62ce8d5830697dcb2a57d44f3315dd5fcb201f0b8ca59ac95813aae67e0f2f34b99514460bbb49160ee9d80dca679b2be4335b93895a26a1b3cc26ce2d31e606

  • SSDEEP

    1536:50reWEbnUcMyU05dvIn7tbbYlsfRadLbekbOeED7:arLQUW5d+bbYlORaR6kbOeA

Score
10/10

Malware Config

Extracted

Family

xworm

C2

sep-framing.gl.at.ply.gg:61526

Attributes
  • install_file

    USB.exe

Targets

    • Target

      Async Spoofer.exe

    • Size

      57KB

    • MD5

      61ad698be29af6af78a4d72cbecc612f

    • SHA1

      b58f0d473b9aa56b1b0e95322e2cbd4d9c273d12

    • SHA256

      12a60961e377b05f0dcd728e1e5f469754c3003c31024db47a83c940bf22b474

    • SHA512

      62ce8d5830697dcb2a57d44f3315dd5fcb201f0b8ca59ac95813aae67e0f2f34b99514460bbb49160ee9d80dca679b2be4335b93895a26a1b3cc26ce2d31e606

    • SSDEEP

      1536:50reWEbnUcMyU05dvIn7tbbYlsfRadLbekbOeED7:arLQUW5d+bbYlORaR6kbOeA

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks