General

  • Target

    640194b0d51307f362b74fd4a4a1761d.bin

  • Size

    19KB

  • Sample

    241119-bqk76atlbk

  • MD5

    09f2add724dd475c2b3d76b9f1415a0e

  • SHA1

    9dec989383c16ca2d07c306b2b3924fabd0ff477

  • SHA256

    65e9c64903ed006ba2ad1f2892f7c7d7b4b6b6d20ecbecb24c41cd913adcb058

  • SHA512

    63ab2ef69d4bb11f92c4b13fe8334f663f072a3c99d15042d594a560a8fe7a5bdc3d099c4422a050beabca20a1840763d6c66596c1e16315bf19b2fae9e849d6

  • SSDEEP

    384:ujEX6wiC9m+G3pAmCcAHUMUrVHJq7AkpwOPH+OWLv9fMGcSv:539+ZAZX0hHM/ppHmrN

Malware Config

Extracted

Family

xworm

Version

5.0

C2

perfect-invest.gl.at.ply.gg:61586

Mutex

vnCrrKpdlb0ooKNR

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot7602273147:AAGPHHPgO8DxUDOWK0ZCgtSD_Rua_8wVzrE/sendMessage?chat_id=6589427579

aes.plain

Targets

    • Target

      b31d01d8e826ea4773cd7cfdbfca3712287024c03463acb374b5040af27fae71.exe

    • Size

      39KB

    • MD5

      640194b0d51307f362b74fd4a4a1761d

    • SHA1

      8e623f6ba2c87803f079b85578289359d71c6c90

    • SHA256

      b31d01d8e826ea4773cd7cfdbfca3712287024c03463acb374b5040af27fae71

    • SHA512

      7631827a014041c8066e334584116db7a3320de4fbbae285c9c87bccc53381ddc525add1f031e5920e01450155aa22b1550de2725ff213ea9fbb3e5c26118dc2

    • SSDEEP

      768:feMIxy4cStkT1MfdDtVISFp9ITOMhkbF:feMIxnmpM5X3Fp9ITOMiJ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks