General

  • Target

    27c5259e178974a6fbc4c478d8c30b85262754ae2ce620e2c7295dab9d9df462N.exe

  • Size

    41KB

  • Sample

    241203-j9tyeaxkfv

  • MD5

    55e5b9b534e7bffe1f43517db9506ae0

  • SHA1

    d55f7b182592307d8bd60a397b5b9b1f93fa9978

  • SHA256

    27c5259e178974a6fbc4c478d8c30b85262754ae2ce620e2c7295dab9d9df462

  • SHA512

    cce1f9cf7f10500c04ac9e71b0b07fe04ffe77de6955a93795dafb9fa0559e58eeba54b2f2d8b17d0bff537cbe9ffee6f1a3464dd5b716cb7c1f25f4acdaef2f

  • SSDEEP

    768:cGFDV1EkGq5VuKlP0Rl0hQvvdF3q9iev6TO+h2IkAC:tFDRL5MKx07wQvFF69iu6TO+IsC

Malware Config

Extracted

Family

xworm

Version

5.0

C2

193.161.193.99:57817

Mutex

jw11mUPspuncXMvt

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      27c5259e178974a6fbc4c478d8c30b85262754ae2ce620e2c7295dab9d9df462N.exe

    • Size

      41KB

    • MD5

      55e5b9b534e7bffe1f43517db9506ae0

    • SHA1

      d55f7b182592307d8bd60a397b5b9b1f93fa9978

    • SHA256

      27c5259e178974a6fbc4c478d8c30b85262754ae2ce620e2c7295dab9d9df462

    • SHA512

      cce1f9cf7f10500c04ac9e71b0b07fe04ffe77de6955a93795dafb9fa0559e58eeba54b2f2d8b17d0bff537cbe9ffee6f1a3464dd5b716cb7c1f25f4acdaef2f

    • SSDEEP

      768:cGFDV1EkGq5VuKlP0Rl0hQvvdF3q9iev6TO+h2IkAC:tFDRL5MKx07wQvFF69iu6TO+IsC

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks