General

  • Target

    EagleSpy V5 Cracked By @R3D_Dev.zip

  • Size

    322.9MB

  • Sample

    241228-tnk4gszjdx

  • MD5

    fc2524a3c18eddd353bd5cb80cf7dc0d

  • SHA1

    7bfbfd7edbe6eb1a92d3741b5a4afaaa222bd60c

  • SHA256

    35d1c3d34870f5c5ac2985bfb359e9cd0d6743a367f55e5cc21992a96deaf85b

  • SHA512

    369c3046450c88dc31190ffa4c1f2f339c5f1fb6fda3abba9565fdafba3bf5245a953333127d18e71269e043d4118a242d192a6c7a04c0423572c5c6c338da1e

  • SSDEEP

    6291456:mUvgkmWuiGyfvKNMZYmrkz4AOPHg8JuGrPriREp4UQ3PVUD1W4Jxka2T1Y:nvg9uvSMfnHgSuG6C6PSpJxkJY

Malware Config

Extracted

Family

xworm

Version

5.0

C2

else-workflow.gl.at.ply.gg:58116

Mutex

hhrcQoynZCKLCvBI

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      EagleSpy V5 Cracked By @R3D_Dev.zip

    • Size

      322.9MB

    • MD5

      fc2524a3c18eddd353bd5cb80cf7dc0d

    • SHA1

      7bfbfd7edbe6eb1a92d3741b5a4afaaa222bd60c

    • SHA256

      35d1c3d34870f5c5ac2985bfb359e9cd0d6743a367f55e5cc21992a96deaf85b

    • SHA512

      369c3046450c88dc31190ffa4c1f2f339c5f1fb6fda3abba9565fdafba3bf5245a953333127d18e71269e043d4118a242d192a6c7a04c0423572c5c6c338da1e

    • SSDEEP

      6291456:mUvgkmWuiGyfvKNMZYmrkz4AOPHg8JuGrPriREp4UQ3PVUD1W4Jxka2T1Y:nvg9uvSMfnHgSuG6C6PSpJxkJY

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks