General

  • Target

    dllhost.exe

  • Size

    63KB

  • Sample

    241119-25jwravlgv

  • MD5

    0ac0f593a66189ac4276db72a0e97c88

  • SHA1

    d80047b556e525cab64c9f133478436a4f1be3d9

  • SHA256

    1221a43aa821b7207c99985c0c3b24041c6c098428c71d857c5c4d90eac03178

  • SHA512

    f6441e9fc18dcee646d493977fcd48aae2942be32231ef2428d118d7bf37e1a7af92f5f304675c68d45b8fd6030ab1da3dc4039ff2135f5e348050a25ff9336d

  • SSDEEP

    1536:2qehLurVLCtiFKMleoAFi1egDkbPiRMH9x+emxOWjQi2W:VehLurb3eDswukbPLkeQOWjQ+

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    dllhost.exe

  • pastebin_url

    https://pastebin.com/raw/k0PQ1Em4

Targets

    • Target

      dllhost.exe

    • Size

      63KB

    • MD5

      0ac0f593a66189ac4276db72a0e97c88

    • SHA1

      d80047b556e525cab64c9f133478436a4f1be3d9

    • SHA256

      1221a43aa821b7207c99985c0c3b24041c6c098428c71d857c5c4d90eac03178

    • SHA512

      f6441e9fc18dcee646d493977fcd48aae2942be32231ef2428d118d7bf37e1a7af92f5f304675c68d45b8fd6030ab1da3dc4039ff2135f5e348050a25ff9336d

    • SSDEEP

      1536:2qehLurVLCtiFKMleoAFi1egDkbPiRMH9x+emxOWjQi2W:VehLurb3eDswukbPLkeQOWjQ+

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks