General

  • Target

    https://mega.nz/file/tQdQXbza#T7Jg7V3gnGr8ENM3MNpCT0oC9Ls7KA48LfudZLbYwGY

  • Sample

    250118-3qse1symdx

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    microsoft.exe

  • pastebin_url

    https://pastebin.com/raw/N6pAtM1g

  • telegram

    https://api.telegram.org/bot8194509243:AAHuGycCOOCR1qZuZsQobJEKrfnKQFVeryI/sendMessage?chat_id=6570700929

Targets

    • Target

      https://mega.nz/file/tQdQXbza#T7Jg7V3gnGr8ENM3MNpCT0oC9Ls7KA48LfudZLbYwGY

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks