General

  • Target

    system.exe

  • Size

    70KB

  • Sample

    250122-ap29lsyqem

  • MD5

    f6629b4ef3c90da475b150ae206e602e

  • SHA1

    a2f94b5688af5d4b4509cda7180f507e37328955

  • SHA256

    e18666c14484cdc9e199559d7ded53156d78bc94494c13d0e0f1c46d0dcc55fc

  • SHA512

    3823d6a356788ac1056b06327ea8864dffe05b19240c2320281566e80d51893da87bc7b1140febf251db3494023ba23a03590af557d6fcd316be772c9f6c8c77

  • SSDEEP

    1536:lWON5YXkjxLC6Uo5DL0JnPbUmIdj9rsQ0QOdVwmcJ:ll5hwK8tPbU7dNBbOdUJ

Malware Config

Extracted

Family

xworm

C2

daily-sexually.gl.at.ply.gg:2131

Attributes
  • Install_directory

    %AppData%

  • install_file

    Update.exe

Targets

    • Target

      system.exe

    • Size

      70KB

    • MD5

      f6629b4ef3c90da475b150ae206e602e

    • SHA1

      a2f94b5688af5d4b4509cda7180f507e37328955

    • SHA256

      e18666c14484cdc9e199559d7ded53156d78bc94494c13d0e0f1c46d0dcc55fc

    • SHA512

      3823d6a356788ac1056b06327ea8864dffe05b19240c2320281566e80d51893da87bc7b1140febf251db3494023ba23a03590af557d6fcd316be772c9f6c8c77

    • SSDEEP

      1536:lWON5YXkjxLC6Uo5DL0JnPbUmIdj9rsQ0QOdVwmcJ:ll5hwK8tPbU7dNBbOdUJ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks