General

  • Target

    uil.exe

  • Size

    34KB

  • Sample

    250302-y6fnyatqy3

  • MD5

    9a27af6e5ad0be342404fc36327274b9

  • SHA1

    fef9c5b16c357ce08e5146c751821a6bb635f5fa

  • SHA256

    19b4961b0fdcc4e320a6f2becd59f5918fc727db685140f64413a82f9235c962

  • SHA512

    811e46e0091b05d281b3d0bb1cd39278b4c20b606620be6de924b7936673d548145fb953b020ce08462f603fa59942762ec6894e7d4770a9307290b77965f56d

  • SSDEEP

    768:MiNxtIWYUcWXNmFdnf1COFy9jvOjhq/UZe:/xt3cWXYzzFy9jvOjkMZe

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

gLXBFwOrGsx6hRJl

Attributes
  • Install_directory

    %AppData%

  • install_file

    Edgeupdater.exe

  • pastebin_url

    https://pastebin.com/raw/MNz8CDNG

aes.plain

Targets

    • Target

      uil.exe

    • Size

      34KB

    • MD5

      9a27af6e5ad0be342404fc36327274b9

    • SHA1

      fef9c5b16c357ce08e5146c751821a6bb635f5fa

    • SHA256

      19b4961b0fdcc4e320a6f2becd59f5918fc727db685140f64413a82f9235c962

    • SHA512

      811e46e0091b05d281b3d0bb1cd39278b4c20b606620be6de924b7936673d548145fb953b020ce08462f603fa59942762ec6894e7d4770a9307290b77965f56d

    • SSDEEP

      768:MiNxtIWYUcWXNmFdnf1COFy9jvOjhq/UZe:/xt3cWXYzzFy9jvOjkMZe

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks