Resubmissions

02/03/2025, 03:20

250302-dvz8zstkt9 10

General

  • Target

    Stigma (2).rar

  • Size

    2.5MB

  • Sample

    250302-dvz8zstkt9

  • MD5

    f59b5951c09b722dbb39a4cd0315f9a3

  • SHA1

    5ade63f7785e17ae3a77673b9296ac643d33e57e

  • SHA256

    ebce67f0ecc1c5ef65712898c79755bb5c2ac02e36f72ab51c902064036dbe63

  • SHA512

    d9ceaa22126782acb6fb4aeda95580fed602e52fc9668814b7a99478425fb1de44a1a1ea13564bb5b99d1e3f7eb756fd5d536fbbe16a0f8b5a5f6cfd8cf556c1

  • SSDEEP

    49152:eeINIqItXBQuhUwbHN02QWjLgYnAixrOUAyS2rySeQFCu:joIqItXBQcbBBLXnlxrhhpryS/R

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:36712

forum-sequences.gl.at.ply.gg:36712

Mutex

MZOKCcmiC6B2AZGJ

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      Stigma (2).rar

    • Size

      2.5MB

    • MD5

      f59b5951c09b722dbb39a4cd0315f9a3

    • SHA1

      5ade63f7785e17ae3a77673b9296ac643d33e57e

    • SHA256

      ebce67f0ecc1c5ef65712898c79755bb5c2ac02e36f72ab51c902064036dbe63

    • SHA512

      d9ceaa22126782acb6fb4aeda95580fed602e52fc9668814b7a99478425fb1de44a1a1ea13564bb5b99d1e3f7eb756fd5d536fbbe16a0f8b5a5f6cfd8cf556c1

    • SSDEEP

      49152:eeINIqItXBQuhUwbHN02QWjLgYnAixrOUAyS2rySeQFCu:joIqItXBQcbBBLXnlxrhhpryS/R

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks