General

  • Target

    kdmapper.exe

  • Size

    69KB

  • Sample

    250120-zddjjsxpgr

  • MD5

    3a84ecb6d7aa88b870c5c03c278568cf

  • SHA1

    7b5b6d52a716fb1b7185d906eecf39dcdf598b53

  • SHA256

    02f831b9005ec9d05ee53a84016aae91573bd25637929f944aadd8bae23e2bbc

  • SHA512

    bcf062a89bf7e5c881fc1c03efdc60d8948f11b470160aaa695bc2985e129f3b24123a61611b5af587d4f3319342a32323891389cac3e5a24ece6aa04877790c

  • SSDEEP

    1536:7ZbYYNTBdvla2CHJ8bW07vzN9AJqt0sOOTs:ph1laHp8bW0LPWLsOOI

Score
10/10

Malware Config

Extracted

Family

xworm

C2

official-walks.gl.at.ply.gg:57776

Attributes
  • Install_directory

    %AppData%

  • install_file

    Winsxcrv645.exe

Targets

    • Target

      kdmapper.exe

    • Size

      69KB

    • MD5

      3a84ecb6d7aa88b870c5c03c278568cf

    • SHA1

      7b5b6d52a716fb1b7185d906eecf39dcdf598b53

    • SHA256

      02f831b9005ec9d05ee53a84016aae91573bd25637929f944aadd8bae23e2bbc

    • SHA512

      bcf062a89bf7e5c881fc1c03efdc60d8948f11b470160aaa695bc2985e129f3b24123a61611b5af587d4f3319342a32323891389cac3e5a24ece6aa04877790c

    • SSDEEP

      1536:7ZbYYNTBdvla2CHJ8bW07vzN9AJqt0sOOTs:ph1laHp8bW0LPWLsOOI

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks