General

  • Target

    Ragnarok.exe

  • Size

    71KB

  • Sample

    250302-3s617ayzds

  • MD5

    871f5ec58f0e3086fdccc877a7baae5d

  • SHA1

    22036d5d3ebcb7d7a6c87e021198642ed081e299

  • SHA256

    c1e1442f1a4b2c4b3d6b1a5f15c6039a0e531c3db3a4e97dea89e1eb98708df4

  • SHA512

    e56985ca26042faca6fa170af5db1b5187990ffab5c6d39bf63999d3f1da2281f873a5b999795e7766f0d99eb05ba42161df4ef2dd46da4d23b1092026677dc7

  • SSDEEP

    1536:0i2BN6LRRM6YDpEOCgMqV0mVZW/F+b4wypLiy+4NZECUvOBXFws:Z2P6LRvpOCgpul9+b4wK+MEXOBXKs

Malware Config

Extracted

Family

xworm

C2

posted-channels.gl.at.ply.gg:38837

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      Ragnarok.exe

    • Size

      71KB

    • MD5

      871f5ec58f0e3086fdccc877a7baae5d

    • SHA1

      22036d5d3ebcb7d7a6c87e021198642ed081e299

    • SHA256

      c1e1442f1a4b2c4b3d6b1a5f15c6039a0e531c3db3a4e97dea89e1eb98708df4

    • SHA512

      e56985ca26042faca6fa170af5db1b5187990ffab5c6d39bf63999d3f1da2281f873a5b999795e7766f0d99eb05ba42161df4ef2dd46da4d23b1092026677dc7

    • SSDEEP

      1536:0i2BN6LRRM6YDpEOCgMqV0mVZW/F+b4wypLiy+4NZECUvOBXFws:Z2P6LRvpOCgpul9+b4wK+MEXOBXKs

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks