General

  • Target

    absa.exe

  • Size

    40KB

  • Sample

    250119-cczdas1pft

  • MD5

    460e1f1c0c297bbc5c338c845cc6cab3

  • SHA1

    4d878c9c30bffaad9294f1b64ebe4195a0aa539e

  • SHA256

    8b430fe278d3c9171af077e49b811e0b3df67e34f5eb45dad3de66ed43b857be

  • SHA512

    90884dcb3b5b40a137ee2e0b6061d988f920d6932b38617d2be168333ccbb1dab320c2ea08176bbc1bddeb221314cd112db771e0dd8e4cc839b18620e5d92860

  • SSDEEP

    768:NF02rc6FGMWmMAOCpwtF5Pf95eOMhR3/p:NFM4G97AOCpIFB95eOMvR

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:1319

147.185.221.25:1319

Mutex

0TSKzYpDexjIVmkQ

Attributes
  • Install_directory

    %AppData%

  • install_file

    Update.exe

aes.plain

Targets

    • Target

      absa.exe

    • Size

      40KB

    • MD5

      460e1f1c0c297bbc5c338c845cc6cab3

    • SHA1

      4d878c9c30bffaad9294f1b64ebe4195a0aa539e

    • SHA256

      8b430fe278d3c9171af077e49b811e0b3df67e34f5eb45dad3de66ed43b857be

    • SHA512

      90884dcb3b5b40a137ee2e0b6061d988f920d6932b38617d2be168333ccbb1dab320c2ea08176bbc1bddeb221314cd112db771e0dd8e4cc839b18620e5d92860

    • SSDEEP

      768:NF02rc6FGMWmMAOCpwtF5Pf95eOMhR3/p:NFM4G97AOCpIFB95eOMvR

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks