Resubmissions

26/01/2025, 20:36

250126-zdnphssph1 10

26/01/2025, 14:28

250126-rsyt2avnfl 10

General

  • Target

    ee14a993b4f9bf8b3f0421f0a44c2057.exe

  • Size

    32KB

  • Sample

    250126-rsyt2avnfl

  • MD5

    ee14a993b4f9bf8b3f0421f0a44c2057

  • SHA1

    e5c03509023e186e2b5dbe92262e4d8b70c406ff

  • SHA256

    12d59b63b5e8301d2f5a55e47931d91d2e17a1bcefc6941afe45c777222314a9

  • SHA512

    39e1b4f68385b3b1ab7111be06c0a309d09967571dfc809aa8ba5b8c06a6799606a838e47bed750e5870a6cfe163617041eb317fd9224ff98fc956372920def3

  • SSDEEP

    384:y+wOeemMOdqtlbRHvEdEmPLtzVFyXyLgZgJaqbNyHBw0V5AR8gtFqBLTm9zZwXJP:lEugjBzGWg6YvBzVOXFh9WkO/h+/zW

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

Mutex

h5HhCg9MKR6vgFJb

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/djZsmRNC

aes.plain

Targets

    • Target

      ee14a993b4f9bf8b3f0421f0a44c2057.exe

    • Size

      32KB

    • MD5

      ee14a993b4f9bf8b3f0421f0a44c2057

    • SHA1

      e5c03509023e186e2b5dbe92262e4d8b70c406ff

    • SHA256

      12d59b63b5e8301d2f5a55e47931d91d2e17a1bcefc6941afe45c777222314a9

    • SHA512

      39e1b4f68385b3b1ab7111be06c0a309d09967571dfc809aa8ba5b8c06a6799606a838e47bed750e5870a6cfe163617041eb317fd9224ff98fc956372920def3

    • SSDEEP

      384:y+wOeemMOdqtlbRHvEdEmPLtzVFyXyLgZgJaqbNyHBw0V5AR8gtFqBLTm9zZwXJP:lEugjBzGWg6YvBzVOXFh9WkO/h+/zW

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks