General

  • Target

    2024-12-01_8d2c7bf27ff3264edb35596ad9ebaa46_cobalt-strike_cobaltstrike_vobfus

  • Size

    3.6MB

  • Sample

    241201-3d482sxlet

  • MD5

    8d2c7bf27ff3264edb35596ad9ebaa46

  • SHA1

    e94174ee0b084fe48a812e4574a983756a58cea9

  • SHA256

    391e7d355a372dca097fc5a947522903782635cc2a2e3e9f7780312bc2a0e6f7

  • SHA512

    ba7e130c8f5f892df1cc86d40865ee8abebbbfd87bec77befb70bc0656ec5726b3a307d3e4dab7f4406824f13584c5d506c31c3bf2c7289d8e57f1b016f22460

  • SSDEEP

    49152:ImViZkf2RpUddY6l8xX11cS3lxnI95u+euCoNJg3t2l0scZqr:ImYkf2R0Jl8xX1/vKUuCIi39scE

Malware Config

Targets

    • Target

      2024-12-01_8d2c7bf27ff3264edb35596ad9ebaa46_cobalt-strike_cobaltstrike_vobfus

    • Size

      3.6MB

    • MD5

      8d2c7bf27ff3264edb35596ad9ebaa46

    • SHA1

      e94174ee0b084fe48a812e4574a983756a58cea9

    • SHA256

      391e7d355a372dca097fc5a947522903782635cc2a2e3e9f7780312bc2a0e6f7

    • SHA512

      ba7e130c8f5f892df1cc86d40865ee8abebbbfd87bec77befb70bc0656ec5726b3a307d3e4dab7f4406824f13584c5d506c31c3bf2c7289d8e57f1b016f22460

    • SSDEEP

      49152:ImViZkf2RpUddY6l8xX11cS3lxnI95u+euCoNJg3t2l0scZqr:ImYkf2R0Jl8xX1/vKUuCIi39scE

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks