General

  • Target

    ac86c4972f7bf9a62ad7bd5fc4ffcccc.zip

  • Size

    448KB

  • Sample

    241203-t9yayatngw

  • MD5

    ac86c4972f7bf9a62ad7bd5fc4ffcccc

  • SHA1

    243ee37d5503bc330b0593a36275dbe452bcce29

  • SHA256

    d99f3b5b99dd6857fd12974b2f292ba7c59d0b99858ed0d1d2d20aeb9b63419c

  • SHA512

    e986dab06df8b89903fe2b8ccb9f19ee48d7971a347cb458d87aa4b04d7d99a938a16cb74dc27bc3fa1be2c24bde65adbd60dc6bebce8664ae450ad714e7ab7a

  • SSDEEP

    6144:2mISoW7EEAZT/ZjlDsjtKBUe9MEu0RTBUY4GzBhWPjn63rrF3Mww3aAFO9B9Zkz4:26oWOjIEGeVR2Y4Gd663rluXSBm4

Malware Config

Extracted

Family

xworm

Version

5.0

C2

87.120.116.179:1300

Mutex

aMI0xjUDQCeZl19j

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      No 00014052024 3 DE DICIEMBRE DE 2024 COBRO JURÍDICO VIGENTE.exe

    • Size

      925KB

    • MD5

      995d3084d0fd6ccc4e85d09b6ca30c12

    • SHA1

      847e8e0116cf85d2a11febab9d0d4c565730aa41

    • SHA256

      cdeab2d0f4995ca3c36fbf98045f7c0ea46f85f47e51b05b14dec1919eaccb81

    • SHA512

      6ce973bb3a6c703763136c4a68bc42724a9caf555115f9810de50edaca1bc7681767b9ceee8cd3cad6720720ad27506f21ad87a98d9f020ce3272ae41e327404

    • SSDEEP

      12288:SY1xBOrpw3Wf+6vk7A5oItYHvmpMxmtPWAl2Rbf+/Zc+hJeg5RrMlT5jwM/FOXJT:SPVqWZvkWoImvOVPWAARbfmZcEAjZ/y

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks