General

  • Target

    10238a6fb5b5c98488255bf8db194fcba7635d2a0e0e4913e5cc593a7a84245fN.exe

  • Size

    37KB

  • Sample

    241118-2h3eks1ren

  • MD5

    db341c806e9ad9b3b6bb394b0ad3c190

  • SHA1

    08018e1d7808828951c03663d55a7d1256046e96

  • SHA256

    10238a6fb5b5c98488255bf8db194fcba7635d2a0e0e4913e5cc593a7a84245f

  • SHA512

    476268ac10037a47aeb10ab4b3a95e44800a05221f04d20885adb36359af88e46f12633a0777da314ac783d87cf78fc8f16d3f975b522978995968bea8829d17

  • SSDEEP

    384:0G1LPXqrLNpOCSYSP9zoHtLZXwq7g5aOKNnwg/pBrCJLqm3AXkrhpkF0+LTRZwdm:JPaZc55K6sAom3AUoFW9ggO1hDQM/

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

Nen131aoFM2x3zyi

Attributes
  • Install_directory

    %AppData%

  • install_file

    OKEAN.exe

  • pastebin_url

    https://pastebin.com/raw/b28eXjCB

aes.plain

Targets

    • Target

      10238a6fb5b5c98488255bf8db194fcba7635d2a0e0e4913e5cc593a7a84245fN.exe

    • Size

      37KB

    • MD5

      db341c806e9ad9b3b6bb394b0ad3c190

    • SHA1

      08018e1d7808828951c03663d55a7d1256046e96

    • SHA256

      10238a6fb5b5c98488255bf8db194fcba7635d2a0e0e4913e5cc593a7a84245f

    • SHA512

      476268ac10037a47aeb10ab4b3a95e44800a05221f04d20885adb36359af88e46f12633a0777da314ac783d87cf78fc8f16d3f975b522978995968bea8829d17

    • SSDEEP

      384:0G1LPXqrLNpOCSYSP9zoHtLZXwq7g5aOKNnwg/pBrCJLqm3AXkrhpkF0+LTRZwdm:JPaZc55K6sAom3AUoFW9ggO1hDQM/

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks