General

  • Target

    0f2bbd800929506cfc016800e07a0db936a559a281a09dd0e7a02b0ea50be136.exe

  • Size

    41KB

  • Sample

    241203-sx6aca1les

  • MD5

    be6fbbb3a3e7ccc6c952cb268b3c1b22

  • SHA1

    0ba5e06720847b661d5564334c33ea87d1b59160

  • SHA256

    0f2bbd800929506cfc016800e07a0db936a559a281a09dd0e7a02b0ea50be136

  • SHA512

    d4779d70269258e72fff7e6d062048cbc1558b4c68898cfbe00fb74e5f9dcd34c9369f0981535871879ce96929dfbb44eb514bac2dd48c862d813fa3d23a3604

  • SSDEEP

    768:cGFDV1EkGq5VuKlP0Rl0hQvvdF3q9iev6TO+h2IkAC5:tFDRL5MKx07wQvFF69iu6TO+IsC5

Malware Config

Extracted

Family

xworm

Version

5.0

C2

193.161.193.99:57817

Mutex

jw11mUPspuncXMvt

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      0f2bbd800929506cfc016800e07a0db936a559a281a09dd0e7a02b0ea50be136.exe

    • Size

      41KB

    • MD5

      be6fbbb3a3e7ccc6c952cb268b3c1b22

    • SHA1

      0ba5e06720847b661d5564334c33ea87d1b59160

    • SHA256

      0f2bbd800929506cfc016800e07a0db936a559a281a09dd0e7a02b0ea50be136

    • SHA512

      d4779d70269258e72fff7e6d062048cbc1558b4c68898cfbe00fb74e5f9dcd34c9369f0981535871879ce96929dfbb44eb514bac2dd48c862d813fa3d23a3604

    • SSDEEP

      768:cGFDV1EkGq5VuKlP0Rl0hQvvdF3q9iev6TO+h2IkAC5:tFDRL5MKx07wQvFF69iu6TO+IsC5

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks