General

  • Target

    84d354f7018370bba012bf66ed07844fb96f8f59884f1d102ef46794d650b450N.exe

  • Size

    9KB

  • Sample

    250121-ghj8sayqhk

  • MD5

    0df8781dad511830d4722e2f140f6c60

  • SHA1

    e69045c7a0270aff84dafcd813c05ffbb4c7a20c

  • SHA256

    84d354f7018370bba012bf66ed07844fb96f8f59884f1d102ef46794d650b450

  • SHA512

    653e7550359149b2e383b360a83f0e2bda7e1f14e2e23c8c7296e1c5f865bb83599d550b916c8d2dd6afbef072a17f119f03bc33c51cdf7ce9abb70caf24f3eb

  • SSDEEP

    192:kmGhMITEquCA/a1zbhQ5rycbXfrxQNsWkhbv8EFm/Q:km7rquN/a1zbIryePraXkhIl/

Malware Config

Extracted

Family

xworm

C2

147.185.221.25:18007

Attributes
  • Install_directory

    %AppData%

  • install_file

    svc.exe

  • telegram

    https://api.telegram.org/bot7958612105:AAHSNEPMuFgiaNh4WYBmEL8ysE2Ek6JH2i4/sendMessage?chat_id=8093935255

Targets

    • Target

      84d354f7018370bba012bf66ed07844fb96f8f59884f1d102ef46794d650b450N.exe

    • Size

      9KB

    • MD5

      0df8781dad511830d4722e2f140f6c60

    • SHA1

      e69045c7a0270aff84dafcd813c05ffbb4c7a20c

    • SHA256

      84d354f7018370bba012bf66ed07844fb96f8f59884f1d102ef46794d650b450

    • SHA512

      653e7550359149b2e383b360a83f0e2bda7e1f14e2e23c8c7296e1c5f865bb83599d550b916c8d2dd6afbef072a17f119f03bc33c51cdf7ce9abb70caf24f3eb

    • SSDEEP

      192:kmGhMITEquCA/a1zbhQ5rycbXfrxQNsWkhbv8EFm/Q:km7rquN/a1zbIryePraXkhIl/

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks