General

  • Target

    8ad5b88f65afbb0668dc2e35376a586e67aa97d09e94c2a47172c41b271f472f.exe

  • Size

    32KB

  • Sample

    241212-rrvqzsypbj

  • MD5

    aa21b54e222ad79e8ea469e3e8e8d1a0

  • SHA1

    69743f880cbbbcade254d80f743bb1f0b89d9221

  • SHA256

    8ad5b88f65afbb0668dc2e35376a586e67aa97d09e94c2a47172c41b271f472f

  • SHA512

    3029c801fd059bfa7fbafc1bdc7a9a58fa0ff5f244a7f95225ae171048a1473282eb8ae81a76f32256610f6555178f7b9dc6434deeb9e4a8ad9a1dffc07af0b2

  • SSDEEP

    384:1PmNYo85DCeup3fEhjLuwSm3Tm2eaFO4FzRApkFTBLTsOZwpGd2v99IkuisDNVFz:pA8wlaPBSm3Tw49FzVFE9jGXOjh5bS

Malware Config

Extracted

Family

xworm

Version

5.0

C2

vitalwerks.istmein.de:3150

Mutex

jWXSA287zBis6fzu

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      8ad5b88f65afbb0668dc2e35376a586e67aa97d09e94c2a47172c41b271f472f.exe

    • Size

      32KB

    • MD5

      aa21b54e222ad79e8ea469e3e8e8d1a0

    • SHA1

      69743f880cbbbcade254d80f743bb1f0b89d9221

    • SHA256

      8ad5b88f65afbb0668dc2e35376a586e67aa97d09e94c2a47172c41b271f472f

    • SHA512

      3029c801fd059bfa7fbafc1bdc7a9a58fa0ff5f244a7f95225ae171048a1473282eb8ae81a76f32256610f6555178f7b9dc6434deeb9e4a8ad9a1dffc07af0b2

    • SSDEEP

      384:1PmNYo85DCeup3fEhjLuwSm3Tm2eaFO4FzRApkFTBLTsOZwpGd2v99IkuisDNVFz:pA8wlaPBSm3Tw49FzVFE9jGXOjh5bS

    • Detect Xworm Payload

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Nanocore family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks