General

  • Target

    ASpoofer.bat

  • Size

    412KB

  • Sample

    250125-y3psfaynd1

  • MD5

    b4072c48624667e139963c777247f52c

  • SHA1

    d5f1a4d22c85458253d4572f9ab89b2a20f31a9c

  • SHA256

    410e2db30b4e8a57933ee02c30a1dbbefd1d5572ce30153c0a4db927123df67b

  • SHA512

    d080e2dfd3189c45cf56dc9e7483c4a7302a204abcb2d17cce93c4c814366ea4cbd44b98e0d887dcfafb7eaef6156b1813eee360201df3ff1e20ad0b34f10867

  • SSDEEP

    12288:oAnKKFTbWZb6pfT0ctJ0CM+8GmsGaFltmFy3:oA5bWZ2dn0C/7iY

Malware Config

Extracted

Family

xworm

Attributes
  • install_file

    Mason.exe

Targets

    • Target

      ASpoofer.bat

    • Size

      412KB

    • MD5

      b4072c48624667e139963c777247f52c

    • SHA1

      d5f1a4d22c85458253d4572f9ab89b2a20f31a9c

    • SHA256

      410e2db30b4e8a57933ee02c30a1dbbefd1d5572ce30153c0a4db927123df67b

    • SHA512

      d080e2dfd3189c45cf56dc9e7483c4a7302a204abcb2d17cce93c4c814366ea4cbd44b98e0d887dcfafb7eaef6156b1813eee360201df3ff1e20ad0b34f10867

    • SSDEEP

      12288:oAnKKFTbWZb6pfT0ctJ0CM+8GmsGaFltmFy3:oA5bWZ2dn0C/7iY

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks