General

  • Target

    e000083fbb34cf231e37d9d5c86ba40c8266efe106eb1a8b7e80cf1c0cc4768e.exe

  • Size

    1.1MB

  • Sample

    250120-d323jsyqg1

  • MD5

    4a38f76b967f388a213ff4955d504ecc

  • SHA1

    8749c398b6ae571994d0db8a86c9f13dd739c9bf

  • SHA256

    e000083fbb34cf231e37d9d5c86ba40c8266efe106eb1a8b7e80cf1c0cc4768e

  • SHA512

    2da9ceb255c1f1149d0439fdf83be08dba9d292836fd4352c410778d59ea9c08e24c564a8b76af79d089e30a110ac144c1d93dac19d50d43c8036d610313a56a

  • SSDEEP

    24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8aZ0tmEbmZpA:sTvC/MTQYxsWR7aZ9eom

Malware Config

Targets

    • Target

      e000083fbb34cf231e37d9d5c86ba40c8266efe106eb1a8b7e80cf1c0cc4768e.exe

    • Size

      1.1MB

    • MD5

      4a38f76b967f388a213ff4955d504ecc

    • SHA1

      8749c398b6ae571994d0db8a86c9f13dd739c9bf

    • SHA256

      e000083fbb34cf231e37d9d5c86ba40c8266efe106eb1a8b7e80cf1c0cc4768e

    • SHA512

      2da9ceb255c1f1149d0439fdf83be08dba9d292836fd4352c410778d59ea9c08e24c564a8b76af79d089e30a110ac144c1d93dac19d50d43c8036d610313a56a

    • SSDEEP

      24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8aZ0tmEbmZpA:sTvC/MTQYxsWR7aZ9eom

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks