General

  • Target

    ten's loader.exe

  • Size

    2.9MB

  • Sample

    250122-k1ww3syrcm

  • MD5

    94bc2b3a186f5f3a41304a4e1b57505e

  • SHA1

    29ec490e1a1c7e24193e80b4177d6d368869f3ce

  • SHA256

    44fc51bf740eeed8fee536ab1fc2c01e6b8ab2bada3af62f44ad0a6481d61417

  • SHA512

    314699346a7b9e76fc359235aec2cbd99beef403acf8d3840dfe3c45f3cb56e000de205bb46917f9032a3f85cc893970e454dbbae91e35e0f2f74156aabd9d97

  • SSDEEP

    49152:a55WF1dYq+K99bTC11nTgzRy43M3B1yAowDZc270nBmvLka7/2kUk+/rU2yfuuyc:avAdY4b2DkL3syAo+gBmLv7/Gn/6fY1e

Score
10/10

Malware Config

Extracted

Family

xworm

C2

round-nonprofit.gl.at.ply.gg:40484

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      ten's loader.exe

    • Size

      2.9MB

    • MD5

      94bc2b3a186f5f3a41304a4e1b57505e

    • SHA1

      29ec490e1a1c7e24193e80b4177d6d368869f3ce

    • SHA256

      44fc51bf740eeed8fee536ab1fc2c01e6b8ab2bada3af62f44ad0a6481d61417

    • SHA512

      314699346a7b9e76fc359235aec2cbd99beef403acf8d3840dfe3c45f3cb56e000de205bb46917f9032a3f85cc893970e454dbbae91e35e0f2f74156aabd9d97

    • SSDEEP

      49152:a55WF1dYq+K99bTC11nTgzRy43M3B1yAowDZc270nBmvLka7/2kUk+/rU2yfuuyc:avAdY4b2DkL3syAo+gBmLv7/Gn/6fY1e

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks