General

  • Target

    StorageHealthModelDx.ps1

  • Size

    380KB

  • Sample

    250123-rswdxasnat

  • MD5

    356d6055716915f0c401b24183866606

  • SHA1

    0194ec66083687cd5abf6d5556641228262e3ef1

  • SHA256

    0123a68edee7e4c8451016c4d05e108c771b7a3a9b70ce920d6a24d479234686

  • SHA512

    67a0000ad88b400ae9ca127c20eb8d5910f6ed5b67c98c813966248ab2cd8cc42fd95c9af1255ff0ea324d43982b7a617050af30195aa37d66c25238bb8ffd5e

  • SSDEEP

    1536:3GIDh8DyXBs84VhDEak0EyxWq0DQCI7cKh:3jDhiyXBs84VhDEakbyxWq0DQCI7cKh

Malware Config

Extracted

Family

xworm

Version

2.2

C2

c0mer.publicvm.com:9087

Mutex

Up3zJJOoZ9LMw12U

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      StorageHealthModelDx.ps1

    • Size

      380KB

    • MD5

      356d6055716915f0c401b24183866606

    • SHA1

      0194ec66083687cd5abf6d5556641228262e3ef1

    • SHA256

      0123a68edee7e4c8451016c4d05e108c771b7a3a9b70ce920d6a24d479234686

    • SHA512

      67a0000ad88b400ae9ca127c20eb8d5910f6ed5b67c98c813966248ab2cd8cc42fd95c9af1255ff0ea324d43982b7a617050af30195aa37d66c25238bb8ffd5e

    • SSDEEP

      1536:3GIDh8DyXBs84VhDEak0EyxWq0DQCI7cKh:3jDhiyXBs84VhDEakbyxWq0DQCI7cKh

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks