General

  • Target

    AquaInternal.exe

  • Size

    141KB

  • Sample

    250122-c1ec2atqfq

  • MD5

    3767463ab4e7188e25cd9fbbe7c7c7c7

  • SHA1

    c9fe79d1af207978143ff863ac6d3234af89419d

  • SHA256

    9ec84d8659105a0d29434aa479ed843c6abe17ec502d2b116f3819a3f68eea8f

  • SHA512

    1042364577faff11251f26248e7611e81c8ec3fa70e77b724a2e4390856479939e363d6a1c0dd1c561d23774f91dfbcd9e494a199051743728bec561818205ac

  • SSDEEP

    3072:9wnf6XukUC/pZbO2xT4zIOC4JwDopeg0/:9oSeUfbVFrTg

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:5552

Attributes
  • Install_directory

    %AppData%

  • install_file

    nigger.exe

Targets

    • Target

      AquaInternal.exe

    • Size

      141KB

    • MD5

      3767463ab4e7188e25cd9fbbe7c7c7c7

    • SHA1

      c9fe79d1af207978143ff863ac6d3234af89419d

    • SHA256

      9ec84d8659105a0d29434aa479ed843c6abe17ec502d2b116f3819a3f68eea8f

    • SHA512

      1042364577faff11251f26248e7611e81c8ec3fa70e77b724a2e4390856479939e363d6a1c0dd1c561d23774f91dfbcd9e494a199051743728bec561818205ac

    • SSDEEP

      3072:9wnf6XukUC/pZbO2xT4zIOC4JwDopeg0/:9oSeUfbVFrTg

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks