General

  • Target

    quiet..cc.exe

  • Size

    37KB

  • Sample

    250302-dpx7fasry7

  • MD5

    a991b1676045ce69bbf429d7ac44221b

  • SHA1

    f8927df404f8c4ea8f3d63546aea72122fe600fc

  • SHA256

    c013408e97d08ae9fecc6b62fd7fd3d23322ef6b21aeca2dcc6deb8219246c3f

  • SHA512

    5affdb2296662e80138f18175143819a7e9a1be39a9e53e5166a29d00e4a226d32f8426b8498e4cb82c7d767d299bdb3f1549351b6474798dd7cfefb44f60995

  • SSDEEP

    768:Q5jjKW/XWIeKmxz3AXFyK9Oiq6YOjhgPy8VX:Q5P9XWIG7uF397q6YOjubX

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:37010

countries-allowed.gl.at.ply.gg:37010

called-stainless.gl.at.ply.gg::37010

called-stainless.gl.at.ply.gg:37010

Mutex

FM43L4JzgLoyB9NE

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    RobloxPlayerBeta.exe

aes.plain

Targets

    • Target

      quiet..cc.exe

    • Size

      37KB

    • MD5

      a991b1676045ce69bbf429d7ac44221b

    • SHA1

      f8927df404f8c4ea8f3d63546aea72122fe600fc

    • SHA256

      c013408e97d08ae9fecc6b62fd7fd3d23322ef6b21aeca2dcc6deb8219246c3f

    • SHA512

      5affdb2296662e80138f18175143819a7e9a1be39a9e53e5166a29d00e4a226d32f8426b8498e4cb82c7d767d299bdb3f1549351b6474798dd7cfefb44f60995

    • SSDEEP

      768:Q5jjKW/XWIeKmxz3AXFyK9Oiq6YOjhgPy8VX:Q5P9XWIG7uF397q6YOjubX

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks