General

  • Target

    ashbeel.png

  • Size

    57KB

  • Sample

    250118-y3acrasras

  • MD5

    6ab5859e0e8bb45cd9209171ec4bfae0

  • SHA1

    4de391a13bbbf565f349e76fde8a27bc625dff1c

  • SHA256

    e30b339b0089711199dd9462636626bc764fdc2df349bf1b89edb74cf24c7538

  • SHA512

    1a28f7a24a4a92c5fae8d30f4d4e0786dcf6c59c30c04fdb968661c08ccdbff32b218870d69f22644e548524744036eab9d033f3ddfd5fbcc0eba338e579d554

  • SSDEEP

    1536:MpNiPkCqOYlw3zdZHjsHOB+bQKB0m9Oiklm:ASZ3BZDsS+bQq9Oik4

Score
10/10

Malware Config

Extracted

Family

xworm

C2

poker-dosage.gl.at.ply.gg:10021

Attributes
  • Install_directory

    %AppData%

  • install_file

    RealtekUService86.exe

Targets

    • Target

      ashbeel.png

    • Size

      57KB

    • MD5

      6ab5859e0e8bb45cd9209171ec4bfae0

    • SHA1

      4de391a13bbbf565f349e76fde8a27bc625dff1c

    • SHA256

      e30b339b0089711199dd9462636626bc764fdc2df349bf1b89edb74cf24c7538

    • SHA512

      1a28f7a24a4a92c5fae8d30f4d4e0786dcf6c59c30c04fdb968661c08ccdbff32b218870d69f22644e548524744036eab9d033f3ddfd5fbcc0eba338e579d554

    • SSDEEP

      1536:MpNiPkCqOYlw3zdZHjsHOB+bQKB0m9Oiklm:ASZ3BZDsS+bQq9Oik4

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks