General

  • Target

    alo.exe

  • Size

    53KB

  • Sample

    250119-bshvta1jgz

  • MD5

    f4f2959fc4cb73f5c1897043156f2234

  • SHA1

    b8ec706ea1d052180fa715d71873d6c8ee3642d8

  • SHA256

    d0730d3f813a15f20a7258b36c7ca34d83f97e06e4f57a31d4150ac1c7b90693

  • SHA512

    ca2de671aa171b99f372a00608f2286b28fbc5aa2c6cd227f2cfeaab6ad9f96a8cb7da9c4e10be15d5f2e5bda281809cbd8db4db004e83c717c675606690c8e4

  • SSDEEP

    768:CeQ+Y5J4Z3LSPQVUPjXowhQ5g0xK4o2C+b9nz/QLSthOsBhxa6j:RLWMh+f+bhz/VXOkr1j

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:1312

147.185.221.25:1312

Attributes
  • Install_directory

    %AppData%

  • install_file

    Update.exe

Targets

    • Target

      alo.exe

    • Size

      53KB

    • MD5

      f4f2959fc4cb73f5c1897043156f2234

    • SHA1

      b8ec706ea1d052180fa715d71873d6c8ee3642d8

    • SHA256

      d0730d3f813a15f20a7258b36c7ca34d83f97e06e4f57a31d4150ac1c7b90693

    • SHA512

      ca2de671aa171b99f372a00608f2286b28fbc5aa2c6cd227f2cfeaab6ad9f96a8cb7da9c4e10be15d5f2e5bda281809cbd8db4db004e83c717c675606690c8e4

    • SSDEEP

      768:CeQ+Y5J4Z3LSPQVUPjXowhQ5g0xK4o2C+b9nz/QLSthOsBhxa6j:RLWMh+f+bhz/VXOkr1j

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks