General

  • Target

    b8c74b1b222c4e1a54c8154e3fdbd30ffd6a93cae1b61a6855b7e31f508187f2.exe

  • Size

    831KB

  • Sample

    241118-fvecmatrdk

  • MD5

    7c34b697269a715d224025fce3300fb0

  • SHA1

    429056652fdaef40ad87c8a58df36db93fb58cfd

  • SHA256

    b8c74b1b222c4e1a54c8154e3fdbd30ffd6a93cae1b61a6855b7e31f508187f2

  • SHA512

    6f6a6b23fa8779610c75eac5944e54586eeeadc4891cf3e5454c870c8aa865165a5e991b8973b01a88415ed2b6ca09ae787d2c62472c811a970754f05763b6ae

  • SSDEEP

    768:o4JmoODtZ6xC8qSDQCcZnVJ9QhEHz0uEXOT:o4JmtOfqS0CiD9QhEHz0tk

Malware Config

Extracted

Family

xworm

Version

5.0

C2

procedure.kro.kr:5155

Mutex

Ll3GZBodOrXAw0Lx

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      b8c74b1b222c4e1a54c8154e3fdbd30ffd6a93cae1b61a6855b7e31f508187f2.exe

    • Size

      831KB

    • MD5

      7c34b697269a715d224025fce3300fb0

    • SHA1

      429056652fdaef40ad87c8a58df36db93fb58cfd

    • SHA256

      b8c74b1b222c4e1a54c8154e3fdbd30ffd6a93cae1b61a6855b7e31f508187f2

    • SHA512

      6f6a6b23fa8779610c75eac5944e54586eeeadc4891cf3e5454c870c8aa865165a5e991b8973b01a88415ed2b6ca09ae787d2c62472c811a970754f05763b6ae

    • SSDEEP

      768:o4JmoODtZ6xC8qSDQCcZnVJ9QhEHz0uEXOT:o4JmtOfqS0CiD9QhEHz0tk

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

MITRE ATT&CK Enterprise v15

Tasks