General

  • Target

    bf9aa92f6d38bac626f8063ea8842431ca0c920b919a37e7cac502a86b16b0b9.ps1

  • Size

    197KB

  • Sample

    250119-efa6zsvjev

  • MD5

    e124157225a59d8e04e4599a5c85b189

  • SHA1

    cded47561dfb19922075c42db778ab9a7c0b0ed4

  • SHA256

    bf9aa92f6d38bac626f8063ea8842431ca0c920b919a37e7cac502a86b16b0b9

  • SHA512

    9d50cb8d58d36d772344902649dbbe39540116111e000c0b58e529756bd1bb85e38c1254cc090b41a7d02bd7cb7bfb54e34d0c295c586993c83b2186f997e73e

  • SSDEEP

    6144:T3NC3EKsyh4ciFTdTM2JiW0tDCfQHsQIOGL81wk5q+l5QhYUSX1AcbdxXSFcmfy:TLK0y

Malware Config

Extracted

Family

xworm

C2

85.209.11.15:4404

Attributes
  • install_file

    USB.exe

Targets

    • Target

      bf9aa92f6d38bac626f8063ea8842431ca0c920b919a37e7cac502a86b16b0b9.ps1

    • Size

      197KB

    • MD5

      e124157225a59d8e04e4599a5c85b189

    • SHA1

      cded47561dfb19922075c42db778ab9a7c0b0ed4

    • SHA256

      bf9aa92f6d38bac626f8063ea8842431ca0c920b919a37e7cac502a86b16b0b9

    • SHA512

      9d50cb8d58d36d772344902649dbbe39540116111e000c0b58e529756bd1bb85e38c1254cc090b41a7d02bd7cb7bfb54e34d0c295c586993c83b2186f997e73e

    • SSDEEP

      6144:T3NC3EKsyh4ciFTdTM2JiW0tDCfQHsQIOGL81wk5q+l5QhYUSX1AcbdxXSFcmfy:TLK0y

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks