General

  • Target

    3bb3849ecb572c9c3a757d57e316a1c657d1255025d7f925e592d99de70fb050

  • Size

    1.4MB

  • Sample

    241202-13wl4a1nhl

  • MD5

    2e737cfbff2f50e43ee1f5bd6cd0122a

  • SHA1

    a8959962bdc69e5f464d31bb8a393abedfd2f41a

  • SHA256

    3bb3849ecb572c9c3a757d57e316a1c657d1255025d7f925e592d99de70fb050

  • SHA512

    e5f2359125832f7f921e5efa45ad5e50a19ccbf556242efb86c423f18c3976412baab6400476b4b7b7c3b047e45f1fc46577496c8a011a6330d9ef1d5ae9f45b

  • SSDEEP

    24576:9F1LI9sVz+nS20h9W02JhZIdSoQTpxIK9boE1Lh0I/aLGjozW85ymeQPU4EUCrOL:X1zVaS2S9R0Z42XIK9boE1Lh0I/uCoqg

Malware Config

Extracted

Family

xworm

Version

5.0

C2

87.120.116.179:1300

Mutex

B48go7npq3kwDYCH

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      3bb3849ecb572c9c3a757d57e316a1c657d1255025d7f925e592d99de70fb050

    • Size

      1.4MB

    • MD5

      2e737cfbff2f50e43ee1f5bd6cd0122a

    • SHA1

      a8959962bdc69e5f464d31bb8a393abedfd2f41a

    • SHA256

      3bb3849ecb572c9c3a757d57e316a1c657d1255025d7f925e592d99de70fb050

    • SHA512

      e5f2359125832f7f921e5efa45ad5e50a19ccbf556242efb86c423f18c3976412baab6400476b4b7b7c3b047e45f1fc46577496c8a011a6330d9ef1d5ae9f45b

    • SSDEEP

      24576:9F1LI9sVz+nS20h9W02JhZIdSoQTpxIK9boE1Lh0I/aLGjozW85ymeQPU4EUCrOL:X1zVaS2S9R0Z42XIK9boE1Lh0I/uCoqg

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks