General

  • Target

    96fcb55e93b282b6650cb439cd1a78bc0c723072826fd8f2e584d43d6fbac0c1.ps1

  • Size

    166KB

  • Sample

    250125-ll2dpaylfr

  • MD5

    2c54adfb1177ddcfbe5d7b775d69ac5d

  • SHA1

    f9237539d22ca1c2a82d6bd2c4ee8f4e9b3aa14b

  • SHA256

    96fcb55e93b282b6650cb439cd1a78bc0c723072826fd8f2e584d43d6fbac0c1

  • SHA512

    e4bb318d6c37a5ef54c92716a6a662c9815f89794466ea30360c1eadde851bc7bcc5564300f45f4d9b60dd3cf90c52e676b9d921ede8a4239db6b15a518a3244

  • SSDEEP

    3072:SB7VzghaUYePuBkEx9W2a4OlnlMDFQITg8To7NggwCfjOwKd:SB5VePtS9W2a4OlnlMppTg8TcNBwGjO7

Malware Config

Extracted

Family

xworm

C2

176.113.115.228:4412

Attributes
  • install_file

    USB.exe

Targets

    • Target

      96fcb55e93b282b6650cb439cd1a78bc0c723072826fd8f2e584d43d6fbac0c1.ps1

    • Size

      166KB

    • MD5

      2c54adfb1177ddcfbe5d7b775d69ac5d

    • SHA1

      f9237539d22ca1c2a82d6bd2c4ee8f4e9b3aa14b

    • SHA256

      96fcb55e93b282b6650cb439cd1a78bc0c723072826fd8f2e584d43d6fbac0c1

    • SHA512

      e4bb318d6c37a5ef54c92716a6a662c9815f89794466ea30360c1eadde851bc7bcc5564300f45f4d9b60dd3cf90c52e676b9d921ede8a4239db6b15a518a3244

    • SSDEEP

      3072:SB7VzghaUYePuBkEx9W2a4OlnlMDFQITg8To7NggwCfjOwKd:SB5VePtS9W2a4OlnlMppTg8TcNBwGjO7

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks